多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

多选题
Which two statements are true about traffic shaping and traffic policing?()
A

both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP

B

both traffic shaping and traffic policing support the marking and re-marking of traffic

C

the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic

D

traffic shaping queues excess traffic whereas traffic policing discards excess traffic

E

traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate


参考解析

解析: 暂无解析

相关考题:

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

Which two statements describe traffic policing?()A、Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataB、Excess traffic is buffered so that the traffic remains within the desired rate.C、Packets that conform to traffic policies are not delayed.D、Packet marking is available and allows excess packets to be re-marked with a lower priorit

What does FRTP stand for?()A、Frame Relay Top PseudowireB、Frame Relay Traffic PseudowireC、Frame Relay Traffic ProtocolD、Frame Relay Traffic Policing

Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()A、over leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleavingB、use the service-policy command to attach a traffic flow to an interface on the routerC、use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flowsD、use the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class mapE、use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP valueF、use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()A、Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.B、Use the service-policy command to attach a traffic flow to an interface on the router.C、Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.D、Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.E、Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.F、Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.

Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()A、Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.B、Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.C、Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.D、Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.E、Control Plane Policing (CoPP) protects the transit management and data traffic through the router.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

Which Cisco IOS traffic-shaping mechanism statement is true? ()A、class-based policing is configured using the Modular QoS command-line (MQC)B、only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN linksC、Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configurationD、both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic

What are two QoS mechanisms that are used to prevent packet loss?()A、header compressionB、payload compressionC、low latency queuing (LLQ)D、weighted random early detection (WRED)E、traffic policingF、traffic shaping

Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

what is Cisco provides three mechanisms for regulating or shaping traffic?

A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A、Block both IRC and ICMPB、Utilize SNMP to identify IM usersC、Contact the IM carrier to request the IM account be disabledD、Change the shaping setting to allow minimal traffic to reduce port hopping

多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

多选题Which two statements are true about network voice traffic? (Choose two.)()AVoice traffic is affected more by link speed than FTP traffic is.BVoice traffic is affected more by packet delays than FTP traffic is.CVoice streams involve larger packet sizes than most TCP network traffic involves.DVoice traffic is more sensitive to packet loss than TCP network traffic is.EVoice traffic requires QOS mechanisms only in heavily loaded network segments.

多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

多选题Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()Aover leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleavingBuse the service-policy command to attach a traffic flow to an interface on the routerCuse the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flowsDuse the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class mapEuse the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP valueFuse the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified

多选题Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()AControl Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.BControl Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.CControl Plane Policing (CoPP) uses a dedicated control-plane command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.DControl Plane Policing (CoPP) uses service policy command under relevant interfaces to filter DOS packet to protect routing packets.EControl Plane Policing (CoPP) protects the transit management and data traffic through the router.

多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题Which two statements describe traffic policing?()ATraffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataBExcess traffic is buffered so that the traffic remains within the desired rate.CPackets that conform to traffic policies are not delayed.DPacket marking is available and allows excess packets to be re-marked with a lower priorit

问答题what is Cisco provides three mechanisms for regulating or shaping traffic?

多选题Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()AOver leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.BUse the service-policy command to attach a traffic flow to an interface on the router.CUse the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.DUse the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.EUse the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.FUse the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.