Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()A、Voice needs to be assigned to the hardware priority queue.B、Voice needs to be assigned to the software priority queue.C、Call signaling must have guaranteed bandwidth service.D、Strict-priority queuing should be limited to 50 percent of the capacity of the link.E、At least 33 percent of the link bandwidth should be reserved for default best-effort class.

Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()

  • A、Voice needs to be assigned to the hardware priority queue.
  • B、Voice needs to be assigned to the software priority queue.
  • C、Call signaling must have guaranteed bandwidth service.
  • D、Strict-priority queuing should be limited to 50 percent of the capacity of the link.
  • E、At least 33 percent of the link bandwidth should be reserved for default best-effort class.

相关考题:

Which of these two restaurants doyouprefer?I like()them. A.bothB.both ofC.two ofD.all

Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet uses a loopback circuit to detect collisions.C.A full-duplex Ethernet card allows 20Mbps for data transmission.D.Full-duplex Ethernet makes use of two pairs of wires for data.E.An Ethernet hub can operate both half and full duplex simultaneously.

Which two statements are true with regard to policy ordering? ()(Choose two.) A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which three statements correctly describe the features of the I/O calibration process?()A、Only one I/O calibration process can run at a time.B、It automates the resource allocation for the Automated Maintenance Tasks.C、It improves the performance of the performance-critical sessions while running.D、It can be used to estimate the maximum number of I/Os and maximum latency time for the system.E、The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.

Which two statements correctly describe the relation between a data file and the logical databasestructures()A、An extent cannot spread across data files.B、A segment cannot spread across data files.C、A data file can belong to only one tablespace.D、A data file can have only one segment created in it.E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

If two routers, both reachable from one another, originate functionally equivalent type 2 external- LSAs (i.e,same destination, cost and non-zero forwarding address ), Which of the following statements wouldapply ?()A、Two LSAs will exist in the network for this destination, and both will be usedB、Two LSAs will exist in the network for this destination, but only the one generated by the highest RID ASBR will be usedC、Only the LSA generated by the highest RID ASBR will exist in the networkD、Only the LSA generated by the lowest RID ASBR will exist in the network

Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

Which two statements are true regarding the functionality of the remap command in ASMCMD?()A、It repairs blocks that have read disk I/O errors.B、It checks whether the alias metadata directory and the file directory are linked correctly.C、It repairs blocks by always reading them from the mirror copy and writing them to the original location.D、It reads the blocks from a good copy of an ASM mirror and rewrites them to an alternate location on disk if the blocks on the original location cannot be read properly.

Which two statements are true regarding subqueries? ()A、A subquery can retrieve zero or more rows B、Only two subqueries can be placed atone level C、A subquery can be used only in SQL query statements D、A subquery can appear on either side of a comparison operator E、There is no limit on the number of subquery levels in the WHERE clause of a SELECT statement

多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

多选题Which two statements correctly identify considerations to take into account when deciding onCampus QoS Design elements? ()AVoice needs to be assigned to the hardware priority queueBVoice needs to be assigned to the software priority queueCCall signaling must have guaranteed bandwidth serviceDStrict-priority queuing should be limited to 50 percent of the capacity of the linkEAt least 33 percent or the link bandwidth should be reserved tor default best effort class

多选题Which two statements are true regarding the functionality of the remap command in ASMCMD?()AIt repairs blocks that have read disk I/O errors.BIt checks whether the alias metadata directory and the file directory are linked correctly.CIt repairs blocks by always reading them from the mirror copy and writing them to the original location.DIt reads the blocks from a good copy of an ASM mirror and rewrites them to an alternate location on disk if the blocks on the original location cannot be read properly.

多选题Which three statements correctly describe the features of the I/O calibration process?()AOnly one I/O calibration process can run at a timeBIt automates the resource allocation for the Automated Maintenance TasksCIt improves the performance of the performance-critical sessions while runningDIt can be used to estimate the maximum number of I/Os and maximum latency time for the systemEThe latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE

多选题Which two statements are reserved words in Java?()ARunBImportCDefaultDImplement

多选题Which two code fragments correctly create and initialize a static array of int elements?()AABBCCDD

多选题Which four statements correctly describe functions that are available in SQL? ()AINSTR returns the numeric position of a named character.BNVL2 returns the first non-null expression in the expression list.CTRUNCATE rounds the column, expression, or value to n decimal places.DDECODE translates an expression after comparing it to each search value.ETRIM trims the heading or trailing characters (or both) from a character string.FNVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.GNULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.

多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

多选题Which three statements correctly describe the features of the I/O calibration process?()AOnly one I/O calibration process can run at a time.BIt automates the resource allocation for the Automated Maintenance Tasks.CIt improves the performance of the performance-critical sessions while running.DIt can be used to estimate the maximum number of I/Os and maximum latency time for the system.EThe latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.

多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.

多选题When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?()AVoice needs to be assigned to the hardware priority queue.BVoice needs to be assigned to the software priority queue.CCall signaling must have guaranteed bandwidth service.DStrict-priority queuing should be limited to 50 percent of the capacity of the link.

多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.

多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding