What are two characteristics of the RED algorithm as implemented in JUNOS software?()A、It profiles based on bandwidth.B、It profiles based on loss priority.C、It prevents traffic loss through buffering.D、It prevents global synchronization with tail drops.

What are two characteristics of the RED algorithm as implemented in JUNOS software?()

  • A、It profiles based on bandwidth.
  • B、It profiles based on loss priority.
  • C、It prevents traffic loss through buffering.
  • D、It prevents global synchronization with tail drops.

相关考题:

What are two components of the Junos software architecture? ()(Choose two.) A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes

What are two characteristics of the RED algorithm as implemented in JUNOS software?() A. It profiles based on bandwidth.B. It profiles based on loss priority.C. It prevents traffic loss through buffering.D. It prevents global synchronization with tail drops.

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

What are three examples of a provider-provisioned VPN supported by JUNOS software? () A. L2FB. PPTPC. Circuit cross-connectD. Draft-Martini-based VPNsE. Draft-Kompella-based VPNs

Which two conditions will cause switch-to-wire to occur? ()(Choose two.) A. loss of powerB. QoS congestionC. software failure occuredD. WX device exceeded its license speedE. traffic does not match application definiton

What are two characteristics of OER? () A. It can take on HSRP, VRRP, and GLBP as clients.B. It provides automatic inbound route optimization.C. Path selection may be based on delay, loss, or jitter.D. The border router makes decisions about which outbound path to use.E. Automatic load distribution is provided for multiple connections.

Which two models are the models of DiffServ-Award traffic Engineering?()A、Class-based ModelB、Maximum Allocation ModelC、Russian Doll ModelD、Global Tunnel ModelE、Policy-based Model

Smart Call Home provides an email-based notification for critical system policies. A range of message formats are available for compatibility with pager services, standard email, or XML- based automated parsing applications. Destination profiles are used by Smart Call Home when sending notifications. Which of these are predefined destination profiles supported by Cisco NX- OS Software? ()A、 short-text-destinationB、 prerecorded audio alertsC、 CiscoTAC-1D、 dial911E、 full-text-destination

In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s

What are two components of the Junos software architecture? ()(Choose two.)A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes

What are three examples of a provider-provisioned VPN supported by JUNOS software?()A、L2FB、PPTPC、Circuit cross-connectD、Draft-Martini-based VPNsE、Draft-Kompella-based VPNs

Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

What are two functions associated with JUNOS software class of service?()A、Manage ingress bandwidth.B、Mark packets for special handling.C、Manage congestion by intelligently dropping traffic.D、Classify Frame Relay QoS packets into an equivalent IP CoS environment.

Which two models are the models of DiffServ-Aware Traffic Engineering? ()A、Policy-based ModelB、Class based ModelC、Russian Doll ModelD、Global Tunnel ModelE、Maximum Allocation Model

What are two QoS mechanisms that are used to prevent packet loss?()A、header compressionB、payload compressionC、low latency queuing (LLQ)D、weighted random early detection (WRED)E、traffic policingF、traffic shaping

For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()A、 Compress payload.B、 Use header compression.C、 Increase link capacity.D、 Use random early detection.E、 Guarantee bandwidth to fragile flows.F、 Implement network-based application recognition.

What are two components of the JUNOS Software architecture?()A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A、snoopB、tcpdumpC、monitorD、tail

Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPNsB、2547bis based VPNsC、Sham link based VPNsD、Virtual Router based VPNs

多选题What are two characteristics of OER? ()AIt can take on HSRP, VRRP, and GLBP as clients.BIt provides automatic inbound route optimization.CPath selection may be based on delay, loss, or jitter.DThe border router makes decisions about which outbound path to use.EAutomatic load distribution is provided for multiple connections.

单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()AMartini based VPNsB2547bis based VPNsCSham link based VPNsDVirtual Router based VPNs

多选题What are three examples of a provider-provisioned VPN supported by JUNOS software?()AL2FBPPTPCCircuit cross-connectDDraft-Martini-based VPNsEDraft-Kompella-based VPNs

单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()AMartini based VPN’sB2547bis based VPN’sCSham link based VPN’sDVirtual Router based VPN’s

多选题What are two characteristics of the RED algorithm as implemented in JUNOS software?()AIt profiles based on bandwidth.BIt profiles based on loss priority.CIt prevents traffic loss through buffering.DIt prevents global synchronization with tail drops.

多选题Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()AJUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.BJUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.CJUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.DJUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

多选题For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()ACompress payload.BUse header compression.CIncrease link capacity.DUse random early detection.EGuarantee bandwidth to fragile flows.FImplement network-based application recognition.