多选题Which three statements about classification marking of traffic at Layer 2 are true? ()Aa Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)Ban ATM header includes a 1-bit DE field to provide the CoSCan MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoSDthe CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is usedEin the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoSFin the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS
多选题
Which three statements about classification marking of traffic at Layer 2 are true? ()
A
a Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)
B
an ATM header includes a 1-bit DE field to provide the CoS
C
an MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoS
D
the CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is used
E
in the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoS
F
in the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS
参考解析
解析:
暂无解析
相关考题:
15 Which of the following statements about intangible assets are correct?1 If certain criteria are met, research expenditure must be recognised as an intangible asset.2 Goodwill may not be revalued upwards.3 Internally generated goodwill should not be capitalised.A 2 and 3 onlyB 1 and 3 onlyC 1 and 2 onlyD All three statements are correct
19 Which of the following statements about intangible assets in company financial statements are correct accordingto international accounting standards?1 Internally generated goodwill should not be capitalised.2 Purchased goodwill should normally be amortised through the income statement.3 Development expenditure must be capitalised if certain conditions are met.A 1 and 3 onlyB 1 and 2 onlyC 2 and 3 onlyD All three statements are correct
Which three statements are correct about Rate Limiters? ()(Choose three.) A. one-rate rate limitersB. two-rate rate limitersC. two-rate rate limiters is the defaultD. one-rate rate limiters is the defaultE. there is no default it must be configured
Which three statements are correct about RIP version 2 (Choose three.)()。A、It has the same maximum hop count as version 1B、It uses broadcasts for its routing updatesC、It is a classless routing protocolD、It has a lower default administrative distance than RIP version 1E、It supports authenticationF、It does not send the subnet mask in updates
Which two QoS classification and marking statements are true? ()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which three QoS mechanisms can be configured to improve VoIP quality on a converged network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic
Which two QoS classification and marking statements are true?()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldC、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which of these statements is true about ssids configured in cisco adu?()A、ssids are not case-sensitive.B、ssids must be listed in the same order in the adu as they are in the access point.C、a maximum of three ssids may be configured.D、ssids may have a maximum of 16 characters.
Which three statements about Label-Switched Paths (LSPs) are true? ()A、 LSPs are bidirectional.B、 LSPs are unidirectional.C、 LSPs can be signaled by CAC.D、 LSPs can be configured explicitly.E、 LSPs can be configured dynamically.
Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term
Which three statements about performance analysis by SQL Performance Analyzer are true? ()(Choose three.)A、It detects changes in SQL execution plans.B、It produces results that can be used to create the SQL plan baseline.C、The importance of SQL statements is based on the size of the objects accessed.D、It generates recommendations to run SQL Tuning Advisor to tune regressed SQLs.E、It shows only the overall impact on workload and not the net SQL impact on workload.
Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.
Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.
Which three statements are true about policing? ()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking and remarking are not supported.D、It does not respond to BECN and foresight messages.E、It uses a single- and two-bucket mechanism for metering.
Which three statements are true about Source Specific Multicast?()A、Is best suited for applications that are in the one-to-many category.B、SSM uses shortest path trees only.C、The use of SSM is recommended when there are many sources and it is desirable to keep the amount of mroute state in the routers in the network to a.D、There are no RPs to worry about.
Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.
Which three statements about subqueries are true? ()A、Asinglerowsubquerycanretrieveonlyonecolumnandonerow.B、Asinglerowsubquerycanretrieveonlyonerowbutmanycolumns.C、Amultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.D、Amultiplerowsubquerycanbecomparedusingthe";;";operator.E、AsinglerowsubquerycanusetheINoperator.F、Amultiplerowsubquerycanusethe";=";operator.
多选题Which three statements about Label-Switched Paths (LSPs) are true? ()ALSPs are bidirectional.BLSPs are unidirectional.CLSPs can be signaled by CAC.DLSPs can be configured explicitly.ELSPs can be configured dynamically.
多选题Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()AA device is trusted if it correctly classifies packets.BA device is trusted if it correctly declassifies packets.CThe outermost trusted devices represent the trust boundary.DClassification and marking occur using 802.1ab QoS bits before reaching the trust boundary.ENetwork trust boundaries are automatically configured in IOS version 12.3 and later.FFor scalability, classification should be done as close to the edge as possible.
多选题Which three statements are correct about Rate Limiters? ()(Choose three.)Aone-rate rate limitersBtwo-rate rate limitersCtwo-rate rate limiters is the defaultDone-rate rate limiters is the defaultEthere is no default it must be configured
多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term
多选题Which three statements are true about Source Specific Multicast?()AIs best suited for applications that are in the one-to-many category.BSSM uses shortest path trees only.CThe use of SSM is recommended when there are many sources and it is desirable to keep the amount of mroute state in the routers in the network to a.DThere are no RPs to worry about.
多选题Which three statements about subqueries are true? ()AAsinglerowsubquerycanretrieveonlyonecolumnandonerow.BAsinglerowsubquerycanretrieveonlyonerowbutmanycolumns.CAmultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.DAmultiplerowsubquerycanbecomparedusingthe;;;operator.EAsinglerowsubquerycanusetheINoperator.FAmultiplerowsubquerycanusethe;=;operator.
多选题Which two QoS classification and marking statements are true? ()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.CIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
多选题Which three QoS mechanisms can be configured to improve VoIP quality on a converged network?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP traffic.CThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED for the VoIP traffic