What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A、 The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B、 The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C、 The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D、 The Ethanalyzer captures only control traffic, while SPAN captures data traffic.

What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()

  • A、 The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.
  • B、 The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.
  • C、 The Ethanalyzer captures only data traffic, while SPAN captures all traffic.
  • D、 The Ethanalyzer captures only control traffic, while SPAN captures data traffic.

相关考题:

What are some of the characteristics of a typical VLAN arrangement, found throughout the Ezonexam switched LAN? (Select all that apply)A. VLANs logically divide a switch into multiple, independent switches at Layer 2.B. Trunk links can carry traffic for multiple VLANs.C. VLAN implementation significantly increases traffic due to added trunking information.D. A VLAN can span multiple switches.E. VLANs typically increase the number of switches neededF. VLANs typically decrease the number of switches needed

Based on the configuration shown in the exhibit, what will happen to the traffic matching the securitypolicy?() A. The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.B. The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.C. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.D. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.

An administrator is troubleshooting a communication issue between two computers on the sameLayer 2 switch.Which of the following is the BEST way to determine if the switch is causing the issue?() A. Setup an ACL that allows and logs all IP traffic between the two computersB. Configure a spanning tree to check for a loopC. Setup a span port on the switch to watch for CRC errorsD. Connect both computers using a crossover cable

What protection method is used in 4F BLSR networks?() A. Each fiber has half of its SONET capacity reserved for protection.B. Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.C. The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D. The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

What occurs on a Frame Relay network when the CIR is exceeded?() A.All TCP traffic is marked discard eligible.B.All UDP traffic is marked discard eligible and a BECN is sent.C.All TCP traffic is marked discard eligible and a BECN is sent.D.All traffic exceeding the CIR is marked discard eligible.

What is implied in “if you do get on eventually,just make sure to take both ways before crossing the street!”?A You will be too excited to watch the traffic.B Enjoying electronic devices while walking may invite traffic accidents.C It is not possible for you to get such a backpack.D It is wise of you to have such a backpack.

Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A、 The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B、 The AED is responsible for load balancing all traffic for all VLANs across the transport network.C、 The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D、 The AED is responsible for MAC address dispute contention for a given VLAN.

What occurs on a Frame Relay network when the CIR is exceeded?()A、All TCP traffic is marked discard eligibleB、All UDP traffic is marked discard eligible and a BECN is sentC、All TCP traffic is marked discard eligible and a BECN is sentD、All traffic exceeding the CIR is marked discard eligible

On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()A、All traffic will be allowed to exit E0 except FTP traffic.B、FTP traffic from 192.168.166.19 to any host will be denied.C、FTP traffic from 192.168.166.22 to any host will be denied.D、All traffic exiting E0 will be denied.E、All FTP traffic to network 192.168.166.18/29 from any host will be denied.

What is the function of the command switchport trunk native vlan 999 on a?()A、It designates VLAN 999 for untagged traffic.B、It blocks VLAN 999 traffic from passing on the trunk.C、It createsa VLAN 999 interface.D、It designates VLAN 999 as the default for all unkown tagged traffic.

What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()A、 Business-critical traffic will be sorted into two QoS classes.B、 Real-time traffic will be sorted into one QoS class.C、 Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.D、 All traffic except real-time will be considered best-effort.E、 Routing, management, and transactional traffic will be considered business-critical.F、 Voice and call signaling traffic will be considered real-time.

An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable

Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()A、all traffic is encrypted using IPSec and the Triple-DES algorithmB、full support for all Enterprise applications, including data, voice, and videoC、thousands of Teleworker VPN tunnels can be aggregated to a headquarters locationD、the VPN tunnel is an always on site-to-site VPN connectionE、portability for use while travelingF、used with broadband Cable/DSL subscriptions

What is the function of the command switchport trunk native vlan 999 on a switch?()A、It designates VLAN 999 for untagged traffic.B、It blocks VLAN 999 traffic from passing on the trunk.C、It creates a VLAN 999 interface.D、It designates VLAN 999 as the default for all unkown tagged traffic.

Which Control Plane Policing (CoPP) statement is true?()A、 Traffic to be policed is identified using the control-plane global configuration command.B、 The control-plane global configuration command enters the Cisco Modular QoS CLI (MQC) mode.C、 The control-plane global configuration command enters the control-plane configuration mode. D、 Traffic to be policed is identified using the control-plane interface configuration command.E、 The control-plane interface configuration command enters the Cisco Modular QoS CLI (MQC) mode.F、 The control-plane interface configuration command enters the control-plane configuration mode.

Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  A、 The CoS value is trusted for 802.1p or 802.1q tagged traffic.B、 The voice VLAN feature is disabled by default.C、 The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.D、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.E、 PortFast is automatically disabled when a voice VLAN is configured.F、 The default CoS value for incoming traffic is set to 0.

How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题A traffic separation zone is that part of a traffic separation scheme which().Ais between the scheme and the nearest landBcontains all the traffic moving in one directionCis designated as an anchorage areaDseparates traffic proceeding in one direction from traffic proceeding in the opposite direction

单选题A traffic separation zone is that part of a traffic separation scheme which().Ais located between the scheme and the nearest landBseparates traffic proceeding in one direction from traffic proceeding in the opposite directionCis designated as an anchorage areaDcontains all the traffic moving in the same direction

单选题Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B The AED is responsible for load balancing all traffic for all VLANs across the transport network.C The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D The AED is responsible for MAC address dispute contention for a given VLAN.

单选题What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D The Ethanalyzer captures only control traffic, while SPAN captures data traffic.

多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

单选题What is meant by the term "firewall sandwich"?()Amultiple layers of firewallingBa method of operating firewalls from multiple vendorsCfirewall connections in either an active or standby stateDan architecture in which all traffic between firewalls goes through application-specific serversEan architecture in which all traffic between firewalls goes through application-specific gateways