Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()A、World Wide Web traffic using load balanced web serversB、voiceC、peer to peer applications mission critical applicationsD、peer to peer applicationsE、multicast routing protocols

Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()

  • A、World Wide Web traffic using load balanced web servers
  • B、voice
  • C、peer to peer applications mission critical applications
  • D、peer to peer applications
  • E、multicast routing protocols

相关考题:

Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.) A. The statistics show savings for all CIFS traffic.B. The traffic transfered over 4,000 seconds faster.C. There was a bandwidth savings of almost 68.9%.D. The acceleration is only working for 68.9% of the traffic

Which two configurations are made using the QoS Setup Wizard? ()(Choose two.) A. Assign applications to traffic classes.B. Use ToS/DSCP values for traffic classes.C. Exclude subnets from QoS management.D. Select dedicated vs. over-subscribed circuits.

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

Which two statements describe traffic policing?()A、Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataB、Excess traffic is buffered so that the traffic remains within the desired rate.C、Packets that conform to traffic policies are not delayed.D、Packet marking is available and allows excess packets to be re-marked with a lower priorit

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

Which two traffic types trigger pass-through firewall user authentication?()A、SSHB、TelnetC、ICMPD、OSPFE、HTTP

Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

多选题Which two configurations are made using the QoS Setup Wizard?() (Choose two.)AAssign applications to traffic classes.BUse ToS/DSCP values for traffic classes.CExclude subnets from QoS management.DSelect dedicated vs. over-subscribed circuits

多选题Which two benefits are provided by creating VLANs? ()Aadded securityBdedicated bandwidthCprovides segmentationDallows switches to route traffic between subinterfacesEcontains collisions

多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP

多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

多选题The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()ABusiness-critical traffic will be sorted into two QoS classes.BReal-time traffic will be sorted into one QoS class.CVoice traffic will be considered real-time traffic while call signaling will be considered business-critical.DAll traffic except real-time will be considered best-effort.ERouting, management, and transactional traffic will be considered business-critical.FVoice and call signaling traffic will be considered real-time.

多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.

多选题Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()AalternateBbackupCdesignatedDdisabledEroot

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题Which two statements describe traffic policing?()ATraffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataBExcess traffic is buffered so that the traffic remains within the desired rate.CPackets that conform to traffic policies are not delayed.DPacket marking is available and allows excess packets to be re-marked with a lower priorit

多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding