单选题Which statement best describes the application of link fragmentation and interleaving (LFI)?()AIt compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstBIt fragments larger packets and allows VoIP packets to be transmitted in between them.CIt stops the transmission of large packets when priority packets arrive.DIt sends high priority packets in between normal traffic packets.

单选题
Which statement best describes the application of link fragmentation and interleaving (LFI)?()
A

It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first

B

It fragments larger packets and allows VoIP packets to be transmitted in between them.

C

It stops the transmission of large packets when priority packets arrive.

D

It sends high priority packets in between normal traffic packets.


参考解析

解析: 暂无解析

相关考题:

Which of the following describes a server that is hosting only an Anti-virus program?() A. Distributed Application ServerB. Dedicated Application ServerC. Peer-to-Peer Application ServerD. File and Print Server

Which statement describes VRRP object tracking?() A.It monitors traffic flow and link utilization.B.It ensures the best VRRP router is the virtual router master for the group.C.It causes traffic to dynamically move to higher bandwidth linksD.It thwarts man-in-the-middle attacks.

Switch R1 has been configured with DTP using the desirable option.  Which statement describes  Dynamic Trunking Protocol (DTP) desirable mode?()A、 The interface actively attempts to convert the link to a trunk link.B、 The interface is put into permanent trunking mode but prevented from generating DTP frames.  C、 The interface is put into permanent trunking mode and negotiates to convert the link into a trunk  link.D、 The interface is put into a passive mode, waiting to convert the link to a trunk link.  E、 None of the other alternatives apply

Which statement describes VRRP object tracking?()A、It monitors traffic flow and link utilization.B、It ensures the best VRRP router is the virtual router master for the group.C、It causes traffic to dynamically move to higher bandwidth linksD、It thwarts man-in-the-middle attacks.

What best describes the features of the Cisco 850 Series routers?() A、integrates data,security,and wirelessB、integrates data,ecurity,wireless and application optimizationC、integrates voice,data,security,wireless and application optimizationD、integrates data and wireless

Which statement best describes what Cisco Smart Care Service provides?()A、bundled technical support and maintenance for Cisco networksB、bundled, unlimited support with the purchase of any Cisco productC、technical support, maintenance, and monitoring to Cisco networksD、fee-based add-on support and tech-to-tech assistance for Cisco products

Which statement best describes the application of link fragmentation and interleaving (LFI)?()A、It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB、It fragments larger packets and allows VoIP packets to be transmitted in between them.C、It stops the transmission of large packets when priority packets arrive.D、It sends high priority packets in between normal traffic packets.

Which statement describes how RSVP guarantees bandwidth reservations?()A、It polices each individual session to an explicit rate.B、It does not police, but never allows link oversubscription.C、It polices the aggregate rate of all sessions to an explicit rate.D、It does not police, but limits the amount of reservable bandwidth.

Ⅲ. There are four choices following each statement. Mark the choice that can best complete the statement: If a linguistic study describes and analyzes the language people actually use, it is said to be ()A、prescriptiveB、analyticC、descriptiveD、linguistic

Which of the following BEST describes RAID 10?()A、 Mirroring with stripingB、 Mirroring with fault toleranceC、 StripingD、 Striping with distributed parity

Which of the following describes a server that is hosting only an Anti-virus program?()A、 Distributed Application ServerB、 Dedicated Application ServerC、 Peer-to-Peer Application ServerD、 File and Print Server

Which of the following BEST describes a benefit of RAID 0?()A、High fault toleranceB、Ease of failure recoveryC、High performanceD、No configuration

Which of the following BEST describes RAID 1?()A、MirroringB、StripingC、Striping with parityD、Striping with mirroring

Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A、The cursor is only protected from updates and deletes by concurrent applications.B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

Which of the following best describes what is meant by Linux Affinity on AIX?()A、The ability to install a Linux system on an AIX systemB、The ability to install an AIX system on a Linux systemC、The ability to compile and run a Linux application on AIXD、The ability to compile and run an AIX application on Linux

A customer has a mission-critical application with redundant fabrics. The customer plans to replace older EMC Symmetrix 8830 systems with an IBM System Storage DS8700 and an IBM SAN Volume Controller (SVC).  Which statement best describes the way to minimize the impact of data migration on the production environment()A、the production environment does not require an outageB、the production environment requires an outage to install the SVCC、the production environment requires an outage to install the DS8700D、the production environment requires an outage to remove the EMC systems

单选题Which statement describes VRRP object tracking?()AIt monitors traffic flow and link utilization.BIt ensures the best VRRP router is the virtual router master for the group.CIt causes traffic to dynamically move to higher bandwidth linksDIt thwarts man-in-the-middle attacks.

单选题Switch R1 has been configured with DTP using the desirable option.  Which statement describes  Dynamic Trunking Protocol (DTP) desirable mode?()A The interface actively attempts to convert the link to a trunk link.B The interface is put into permanent trunking mode but prevented from generating DTP frames.  C The interface is put into permanent trunking mode and negotiates to convert the link into a trunk  link.D The interface is put into a passive mode, waiting to convert the link to a trunk link.  E None of the other alternatives apply

单选题A customer has a mission-critical application with redundant fabrics. The customer plans to replace older EMC Symmetrix 8830 systems with an IBM System Storage DS8700 and an IBM SAN Volume Controller (SVC).  Which statement best describes the way to minimize the impact of data migration on the production environment()Athe production environment does not require an outageBthe production environment requires an outage to install the SVCCthe production environment requires an outage to install the DS8700Dthe production environment requires an outage to remove the EMC systems

单选题The word which best describes the tone of the poem When We Two Parted is _____.AsentimentalBironicCparadoxicalDrealistic

单选题Which statement describes how RSVP guarantees bandwidth reservations?()AIt polices each individual session to an explicit rate.BIt does not police, but never allows link oversubscription.CIt polices the aggregate rate of all sessions to an explicit rate.DIt does not police, but limits the amount of reservable bandwidth.

单选题Which of the following best describes the age of the data in an OLTP system?()ACurrentBProjectedCHistoricalDCurrent and projected

单选题Which of the following best describes what is meant by Linux Affinity on AIX?()AThe ability to install a Linux system on an AIX systemBThe ability to install an AIX system on a Linux systemCThe ability to compile and run a Linux application on AIXDThe ability to compile and run an AIX application on Linux

单选题Which of the following describes a server that is hosting only an Anti-virus program?()A Distributed Application ServerB Dedicated Application ServerC Peer-to-Peer Application ServerD File and Print Server

单选题The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B ISRs provide the framework to integrate and extend wired and wireless networksC ISRs provide concurrent security, voice, data, wireless, and application optimization services.D ISRS provide the common fabric, functionality, and CLI across the network.