多选题What are two purposes of a forwarding class?()Ato identify traffic that should be droppedBto classify trafficCto identify traffic that should receive common treatmentDto assign traffic to output queues
多选题
What are two purposes of a forwarding class?()
A
to identify traffic that should be dropped
B
to classify traffic
C
to identify traffic that should receive common treatment
D
to assign traffic to output queues
参考解析
解析:
暂无解析
相关考题:
What is the purpose of unicast reverse path forwarding?() A. to validate packet receipt on interfaces where the traffic should be receivedB. to forward packets out the interfaces where the traffic should be receivedC. to forward packets out the interfaces where the traffic should be sentD. to validate packet receipt on interfaces where the traffic should be sent
What are three functions associated with JUNOS software class of service?() A. Log incoming traffic.B. Classify incoming packets.C. Manage outbound bandwidth.D. Manage congestion by intelligently dropping traffic.E. Classify ATM QoS packets into an equivalent IP CoS environment.
What are the contents of a scheduler?() A.A scheduler contains parameters that describe how a queue should be serviced.B.A scheduler contains traffic that is ready to be transmitted.C.A scheduler contains forwarding classes that allow traffic to be forwarded.D.A scheduler contains a map between the classification of a packet and its forwarding class.
What are some general guidelines regarding the placement of access control lists?() A. You should place standard ACLS as close as possible to the source of traffic to be denied.B. You should place extended ACLS as close as possible to the source of traffic to be denied.C. You should place standard ACLS as close as possible to the destination of traffic to be denied.D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists
Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.
Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A、Block both IRC and ICMPB、Utilize SNMP to identify IM usersC、Contact the IM carrier to request the IM account be disabledD、Change the shaping setting to allow minimal traffic to reduce port hopping
What are two functions associated with JUNOS software class of service?()A、Log incoming traffic.B、Manage ingress bandwidth.C、Mark packets for special handling.D、Manage congestion by intelligently dropping traffic.E、Classify Frame Relay QoS packets into an equivalent OP CoS environment.
What is the purpose of unicast reverse path forwarding?()A、to validate packet receipt on interfaces where the traffic should be receivedB、to forward packets out the interfaces where the traffic should be receivedC、to forward packets out the interfaces where the traffic should be sentD、to validate packet receipt on interfaces where the traffic should be sent
What are the contents of a scheduler?()A、A scheduler contains parameters that describe how a queue should be serviced.B、A scheduler contains traffic that is ready to be transmitted.C、A scheduler contains forwarding classes that allow traffic to be forwarded.D、A scheduler contains a map between the classification of a packet and its forwarding class.
What are three functions associated with JUNOS software class of service?()A、Log incoming traffic.B、Classify incoming packets.C、Manage outbound bandwidth.D、Manage congestion by intelligently dropping traffic.E、Classify ATM QoS packets into an equivalent IP CoS environment.
What are two purposes of a forwarding class?()A、to rewrite the ToS bits in the IP headerB、to classify trafficC、to identify traffic that should receive commom treatmentD、to assign traffic to output queues
What are two purposes of a forwarding class?()A、to identify traffic that should be droppedB、to classify trafficC、to identify traffic that should receive common treatmentD、to assign traffic to output queues
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()A、VPN TrafficB、DNS TrafficC、LDAP TrafficD、HTTP TrafficE、HTTPS TrafficF、Traffic from the network address of 192.168.10/24
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
多选题What are two purposes of a forwarding class?()Ato identify traffic that should be droppedBto classify trafficCto identify traffic that should receive common treatmentDto assign traffic to output queues
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24
多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.
多选题What are two purposes of a forwarding class?()Ato rewrite the ToS bits in the IP headerBto classify trafficCto identify traffic that should receive commom treatmentDto assign traffic to output queues
多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
多选题What are two functions of the RE?()Ato maintain routing tablesBto forward traffic toward its destinationCto manage the PFEDto implement various services such as policing, stateless firewall filtering, and class of service
多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding
多选题What are two reasons that a network administrator would use access lists (Choose two.)()。Ato control vty access into a routerBto control broadcast traffic through a routerCto filter traffic as it passes through a routerDto filter traffic that originates from the routerEto replace passwords as a line of defense against security incursions
单选题Which of the following is the BEST reason to implement a firewall on a server?()ATo watch for bandwidth issuesBTo protect the server from all trafficCTo block certain traffic by portsDTo monitor certain malicious traffic
单选题What is the purpose of unicast reverse path forwarding?()Ato validate packet receipt on interfaces where the traffic should be receivedBto forward packets out the interfaces where the traffic should be receivedCto forward packets out the interfaces where the traffic should be sentDto validate packet receipt on interfaces where the traffic should be sent
单选题What are the contents of a scheduler?()AA scheduler contains parameters that describe how a queue should be serviced.BA scheduler contains traffic that is ready to be transmitted.CA scheduler contains forwarding classes that allow traffic to be forwarded.DA scheduler contains a map between the classification of a packet and its forwarding class.