Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing
Prioritizing traffic between data and voice is defined as which of the following?()
- A、Caching engines
- B、Proxy server
- C、QoS
- D、Load balancing
相关考题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
A traffic separation zone is that part of a traffic separation scheme which ______.A.is located between the scheme and the nearest landB.separates traffic proceeding in one direction from traffic proceeding in the opposite directionC.is designated as an anchorage areaD.contains all the traffic moving in the same direction
Traffic reaches its rush hour between 8:00 and 9:00 in the morning.A: borderB: goalC: peakD: level
Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm
What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A、 The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B、 The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C、 The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D、 The Ethanalyzer captures only control traffic, while SPAN captures data traffic.
Which statement is correct about an OSPF sham-link?()A、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.B、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.C、A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.D、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.E、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.
What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
By default, if equal-cost paths exist for the same destination, which action will the router take?()A、Drop half the traffic.B、Make a copy of the traffic and send it to both destinations.C、Load-balance traffic between the available paths.D、Randomly select one of the available paths to send traffic.
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
多选题The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()AControl traffic between an access point and a controller is encrypted within LWAPP.BData traffic between an access point and a controller is encrypted within LWAPP.CLayer 3 mode packets are transmitted in TCP frames.DData traffic between an access point and a controller is encapsulated within LWAPP.EVLAN tagging and QoS markings are applied at the access point.
单选题Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?()A The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.B The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.C The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.D The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.
单选题A traffic separation zone is that part of a traffic separation scheme which().Ais located between the scheme and the nearest landBseparates traffic proceeding in one direction from traffic proceeding in the opposite directionCis designated as an anchorage areaDcontains all the traffic moving in the same direction
单选题By default, if equal-cost paths exist for the same destination, which action will the router take?()ADrop half the traffic.BMake a copy of the traffic and send it to both destinations.CLoad-balance traffic between the available paths.DRandomly select one of the available paths to send traffic.
单选题What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D The Ethanalyzer captures only control traffic, while SPAN captures data traffic.
多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
单选题Which statement is correct about an OSPF sham-link?()AA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.BA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.CA sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.DA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.EA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
单选题By default if equal-cost paths exists for the same destination, which action will the router take?()ADrop half the trafficBMake a copy of the traffic and send it to both testinationsCLoad-balance traffic between the available pathsDRandomly select one of the available paths to send traffic
单选题A traffic separation zone is that part of a traffic separation scheme which().Ais between the scheme and the nearest landBcontains all the traffic moving in one directionCis designated as an anchorage areaDseparates traffic proceeding in one direction from traffic proceeding in the opposite direction
多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.
单选题What is meant by the term "firewall sandwich"?()Amultiple layers of firewallingBa method of operating firewalls from multiple vendorsCfirewall connections in either an active or standby stateDan architecture in which all traffic between firewalls goes through application-specific serversEan architecture in which all traffic between firewalls goes through application-specific gateways
单选题Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above