Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

A. source port

B. output interface

C. next-hop IP address

D. source MAC address

E. destination IP address

F. next-hop MAC address


相关考题:

Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

Which three statements about NetFlow are true?()A、NetFlow records unidirectional IP traffic flow.B、NetFlow records MPLS frame flow.C、NetFlow expert is only over TCP.D、NetFlow records is only over UDP.E、NetFlow records subinterface information of traffic flow.

Which descriptions of Netflow is correct?()A、By default,Netflow records bidirectional IP traffic flow.B、Netflow answers questions regarding IP traffic:who,what,where,when,and howC、Netflow accounts for both transit traffic and traffic destined for the router.D、Netflow returns the subinterface information in the flow records.

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()A、source portB、output interfaceC、next-hop IP addressD、source MAC addressE、destination IP addressF、next-hop MAC address

Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning

What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetworkB、It is used to identify an IP address as either private or publicC、It is used to identify the network to which an IP address belongsD、It is used to identify the total number of bits present in an IP address

Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.

As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()A、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.D、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

What Netflow component can be applied to an interface to track IPv4 traffic?()A、flow monitorB、flow recordC、flow samplerD、flow

Which statement is correct regarding NBAR and NetFlow?()A、NetFlow uses five key fields for the flowB、NBAR examines data in Layers 3 and 4C、NetFlow examines data in Layers 3 and 4D、NBAR examines data in Layers 2 through 4E、NetFlow examines data in Layers 2 through 4

How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

Which of the following multimeter settings should only be used when there is no electrical flow through the part being tested? ()(Select TWO).A、AmpereB、ContinuityC、VoltD、ResistanceE、Wattage

What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetwork.B、It is used to identify an IP address as either private or public.C、It is used to identify the network to which an IP address belongs.D、It is used to identify the total number of bits present in an IP address.

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

多选题Which two fields are found in an Ethernet frame header?()ATTLBflagsCchecksumDtype

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

单选题Which statement is correct regarding NBAR and NetFlow?()ANetFlow uses five key fields for the flowBNBAR examines data in Layers 3 and 4CNetFlow examines data in Layers 3 and 4DNBAR examines data in Layers 2 through 4ENetFlow examines data in Layers 2 through 4

多选题Which of the following multimeter settings should only be used when there is no electrical flow through the part being tested? ()(Select TWO).AAmpereBContinuityCVoltDResistanceEWattage

多选题Which two fields are found in an Ethernet frame?()AVersionBTTLCChecksumDFlagsEData

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

单选题What is the purpose of a network mask?()AIt is used to identify the maximum hop count of a subnetworkBIt is used to identify an IP address as either private or publicCIt is used to identify the network to which an IP address belongsDIt is used to identify the total number of bits present in an IP address

多选题Which descriptions of Netflow is correct?()ABy default,Netflow records bidirectional IP traffic flow.BNetflow answers questions regarding IP traffic:who,what,where,when,and howCNetflow accounts for both transit traffic and traffic destined for the router.DNetflow returns the subinterface information in the flow records.

多选题Which three statements about NetFlow are true?()ANetFlow records unidirectional IP traffic flow.BNetFlow records MPLS frame flow.CNetFlow expert is only over TCP.DNetFlow records is only over UDP.ENetFlow records subinterface information of traffic flow.

多选题Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()Asource portBoutput interfaceCnext-hop IP addressDsource MAC addressEdestination IP addressFnext-hop MAC address

单选题What is the purpose of a network mask?()AIt is used to identify the maximum hop count of a subnetwork.BIt is used to identify an IP address as either private or public.CIt is used to identify the network to which an IP address belongs.DIt is used to identify the total number of bits present in an IP address.

多选题Cisco IOS NetFlow gathers data that can be used in which three of these? ()AaccountingBauthenticationCauthorizationDnetwork monitoringEnetwork planning