monitor traffic命令能够检测到的traffic()A、入接口at-0/2/0.100,目的到路由引擎B、从路由引擎到出接口at-0/2/0.100C、入接口at-0/2/0.100,目的接口so-2/0/0.0D、从so-2/0/0.0接口到出接口at-0/2/0.100

monitor traffic命令能够检测到的traffic()

  • A、入接口at-0/2/0.100,目的到路由引擎
  • B、从路由引擎到出接口at-0/2/0.100
  • C、入接口at-0/2/0.100,目的接口so-2/0/0.0
  • D、从so-2/0/0.0接口到出接口at-0/2/0.100

相关考题:

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

The monitor traffic command provides access to which utility?() A.tcpdumpB.telnetC.tracerouteD.netstat

The monitor traffic command closely resembles which UNIX-based utility?() A.ps -xB.passwdC.ls -a-lD.tcpdump

Which CLI command displays packet and byte counts for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

EIGRP中traffic-share balanced命令是什么意思?

下列PM计数命令()是错误的。A、#ONT/traffic/voipshow pm rtpB、#ONT/traffic/voipshow pm callcontrolC、#ONT/traffic/ponshow pm gem allD、#ONT/traffic/ethshow pm igmp

H248语音Debug涉及到()命令。A、#ONT/traffic/voipdebug enableB、#ONT/traffic/voipdrv debug enableC、#ONT/traffic/voipdump h248 enableD、#ONT/traffic/voipdump sip show

基于类的QoS的命令行的三大部分是()。A、流分类(traffic classifier)B、流动作(traffic behavior)C、流量策略(traffic policy)D、流量整形和监管

Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

多选题Which two of these are characteristics of an IDS sensor?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IDS interface and exits on anotherEhas a promiscuous interface that is used to monitor the network

多选题Which of the following are benefits provided with access control lists (ACLs)?()AACLs monitor the number of bytes and packets.BVirus detection.CACLs dentify interesting traffic for DDR.DACLs provide IP route filtering.EACLs provide high network availability.FACLs classify and organize network traffic.

单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()AsnoopBtcpdumpCmonitorDtail

单选题The monitor traffic command provides access to which utility?()AtcpdumpBtelnetCtracerouteDnetstat

多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

多选题基于类的QoS的命令行的三大部分是()。A流分类(traffic classifier)B流动作(traffic behavior)C流量策略(traffic policy)D流量整形和监管

单选题Which of the following is the BEST reason to implement a firewall on a server?()ATo watch for bandwidth issuesBTo protect the server from all trafficCTo block certain traffic by portsDTo monitor certain malicious traffic