单选题Assume that network-based application recognition (NBAR) has been configured to gather traffic for all known protocols on an interface. Which command will display the statistical results of all recognized protocols?()Ashowip nbarBshowip nbar pdimCshow ip nbar port-mapDshow ip nbar protocol-discovery

单选题
Assume that network-based application recognition (NBAR) has been configured to gather traffic for all known protocols on an interface. Which command will display the statistical results of all recognized protocols?()
A

showip nbar

B

showip nbar pdim

C

show ip nbar port-map

D

show ip nbar protocol-discovery


参考解析

解析: 暂无解析

相关考题:

In John Whitehead's opinion, which statement is true?A.Face recognition technology may interfere with people's privacy.B.Face recognition technology may enhance the country's constant surveillance.C.Face recognition technology can be used in the same way wiretaps are used.D.Face recognition technology can be used after its threat has been removed.

The government has () this application.A、agree withB、approvedC、approved ofD、accepted

Paragraph 3 shows that a discovery claim becomes credible after it[A] has attracted the attention of the general public.[B]has been examined by the scientific community.[C] has received recognition from editors and reviewers.[D]has been frequently quoted by peer scientists.

A Certificate of Financial Responsibility attests that the vessel ______.A.has financial backing to meet any liability resulting from the discharge of oilB.has the minimum required amount of P & I and hull insuranceC.will assume the responsibility for any damage or loss to the shipperD.has financial reserves to meet reasonable expected crew costs of an intended voyage

What is the purpose of the NBAR protocol discovery?()A、to build a Packet Description Language Module (PDLM) file to be used in protocol matchingB、to discover applications and build class maps for data classificationC、to look into the TCP or UDP payload and classify packets based on the contentD、to build a database of all application data that passes through the router and queue the data accordingly

What are three features of the Cisco IOS Firewall feature set?()A、network-based application recognition (NBAR)B、authentication proxyC、stateful packet filteringD、AAA servicesE、proxy serverF、IPS

The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()A、control plane policingB、data plane policingC、network-based application recognition (NBAR)D、service plane policingE、management plane policing

Assume a tag handler extends TagSupport. Which is used within the tag handler to get an attribute “foo” that is in the application scope?()A、 pageContext.getAttribute(“foo”);B、 getPageContext().getAttribute(“foo”);C、 pageContext.getApplicationScope(“foo”);D、 pageContext.getAttribute(“foo”,pageContext.APPLICATION_SCOPE).getAttribute(“foo”);E、 getPageContext().getScope(pageContext.APPLICATION_SCOPE).getAttribute(“foo”);

What Cisco Switch feature best protects against CAM table overflow attacks?()A、 Storm ControlB、 Port securityC、 CAM table size definitionD、 IP spoof preventionE、 Network Based Application Recognition

Which two types of QoS functionality will be provided by Network-Based Application Recognition?()A、NBAR provides the ability to configure MCQ; it is a mandatory MCQ component.B、NBAR provides deep packet inspection and is used for advanced packet classification.C、NBAR provides per-protocol packet and byte accounting functionality; it is used to track bandwidth utilization for all protocols described in the loaded PDLMs.D、NBAR provides scheduling in an MQC policy map using an advanced algorithm.

You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()A、Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memoryB、If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that applicationC、Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port numberD、The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applicationsE、Use the copy nbar flash: command to download a new PDLM file to flashF、Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website

Which of these is mandatory when configuring Cisco IOS Firewall? ()A、Cisco IOS IPS enabled on the untrusted interfaceB、NBAR enabled to perform protocol discovery and deep packet inspectionC、a route map to define the trusted outgoing trafficD、a route map to define the application inspection rulesE、an inbound extended ACL applied to the untrusted interface

For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()A、 Compress payload.B、 Use header compression.C、 Increase link capacity.D、 Use random early detection.E、 Guarantee bandwidth to fragile flows.F、 Implement network-based application recognition.

Which two statements about the QoS functionality of the Cisco SDM are true?()A、the first step when using the SDM QoS wizard is to select the inbound interface on which the QoS policy must be appliedB、the SDM QoS wizard can be used to optimize LAN, WAN, and VPN interfacesC、he SDM QoS wizard supports network-based application recognition (NBAR) to provide deep and stateful packet inspectionD、he SDM QoS wizard will apply custom queuing and priority queuing policies to the identified interfacesE、he SDM QoS wizard will apply low latency-queuing,custom-queuing and priority-queuing policies to the identified interfacesF、to create and manage the QoS settings, the user must select the QoS wizard task under the Monitor option

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A、8B、6C、9D、5

During initial cluster planning session, a requirement is mandated that application monitoring will  Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources.  How ill the initial design impact the use of application monitoring?()  A、 Only one application server per resource group can be monitored.B、 Process monitoring is part of RSCT and requires no special scripts.C、 Any application can be monitored as long as it has an application server.D、 Having all application servers in one resource group improves recovery time.

You are installing an application on a computer that runs Windows Server 2008 R2.   During installation, the application will need to add new attributes and classes to the Active Directory  database.   You need to ensure that you can install the application.   What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install  the application.D、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to  install the application.

Company.com moved their application start routines from the inittab and place them under HACMP control. During testing,the applications did not always start as desired.  What is the best practice for the application start routines.()  A、 Assume the system was stopped by a failure.B、 Ensure the hostname parameters is set correctly.C、 Assume the system was stopped by a graceful shutdown.D、 Mount all volumes and file systems before running the application.

单选题Assume a tag handler extends TagSupport. Which is used within the tag handler to get an attribute “foo” that is in the application scope?()A pageContext.getAttribute(“foo”);B getPageContext().getAttribute(“foo”);C pageContext.getApplicationScope(“foo”);D pageContext.getAttribute(“foo”,pageContext.APPLICATION_SCOPE).getAttribute(“foo”);E getPageContext().getScope(pageContext.APPLICATION_SCOPE).getAttribute(“foo”);

多选题Given: And MainClass exists in the /apps/com/company/application directory. Assume the CLASSPATH environment variable is set to "." (current directory). Which two java commands entered at the commandline will run MainClass?()Ajava MainClass if run from the /apps directoryBjava com.company.application.MainClass if run from the /apps directoryCjava -classpath /apps com.company.application.MainClass if run from any directoryDjava -classpath . MainClass if run from the /apps/com/company/application directoryEjava -classpath /apps/com/company/application:. MainClass if run from the /apps directory

单选题The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()Acontrol plane policingBdata plane policingCnetwork-based application recognition (NBAR)Dservice plane policingEmanagement plane policing

多选题Which two types of QoS functionality will be provided by Network-Based Application Recognition?()ANBAR provides the ability to configure MCQ; it is a mandatory MCQ component.BNBAR provides deep packet inspection and is used for advanced packet classification.CNBAR provides per-protocol packet and byte accounting functionality; it is used to track bandwidth utilization for all protocols described in the loaded PDLMs.DNBAR provides scheduling in an MQC policy map using an advanced algorithm.

多选题What are three features of the Cisco IOS Firewall feature set?()Anetwork-based application recognition (NBAR)Bauthentication proxyCstateful packet filteringDAAA servicesEproxy serverFIPS

单选题You are installing an application on a computer that runs Windows Server 2008. During installation, the application will nedd to install new attributes and classes to the Active Directory database. You need to ensure that you can install the application. What should you do()AChange the functional level of the forest to WIndows Server 2008.BLog on by using an account that has Server Operator rights.CLog on by using an account that has Schema Administrator rights and the appropriate rights to install the application.DLog on by using an account that has the Enterprise Administrator  rights and the appropriate rights to install the application.

单选题What Cisco Switch feature best protects against CAM table overflow attacks?()A Storm ControlB Port securityC CAM table size definitionD IP spoof preventionE Network Based Application Recognition

单选题Company.com moved their application start routines from the inittab and place them under HACMP control. During testing,the applications did not always start as desired.  What is the best practice for the application start routines.()A Assume the system was stopped by a failure.B Ensure the hostname parameters is set correctly.C Assume the system was stopped by a graceful shutdown.D Mount all volumes and file systems before running the application.

多选题For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()ACompress payload.BUse header compression.CIncrease link capacity.DUse random early detection.EGuarantee bandwidth to fragile flows.FImplement network-based application recognition.