Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()
第1题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()
A.Hub
B. Bridge
C. Switch
D. Router
第2题:
Which two of these are characteristics of an IPS device?()
第3题:
Which two characteristics are common between traffic policing and traffic shaping?()
第4题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
第5题:
Which two statements are true about network voice traffic? (Choose two.)()
第6题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
第7题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第8题:
added security
dedicated bandwidth
provides segmentation
allows switches to route traffic between subinterfaces
contains collisions
第9题:
SSH
Telnet
ICMP
OSPF
HTTP
第10题:
Business-critical traffic will be sorted into two QoS classes.
Real-time traffic will be sorted into one QoS class.
Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.
All traffic except real-time will be considered best-effort.
Routing, management, and transactional traffic will be considered business-critical.
Voice and call signaling traffic will be considered real-time.
第11题:
alternate
backup
designated
disabled
root
第12题:
Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
Excess traffic is buffered so that the traffic remains within the desired rate.
Packets that conform to traffic policies are not delayed.
Packet marking is available and allows excess packets to be re-marked with a lower priorit
第13题:
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
第14题:
Which two statements describe traffic policing?()
第15题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第16题:
Which two traffic types trigger pass-through firewall user authentication?()
第17题:
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
第18题:
Which two statements are true for a security policy? ()(Choose two.)
第19题:
Assign applications to traffic classes.
Use ToS/DSCP values for traffic classes.
Exclude subnets from QoS management.
Select dedicated vs. over-subscribed circuits
第20题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第21题:
incoming interface
Layer 2 differentiated services code point (DSCP)
Layer 3 IP precedence
outgoing interface
第22题:
Excluded traffic is not accelerated.
Excluded traffic is only compressed.
Source/destination filter applies to all traffic sent from LAN to WAN.
Source/destination filters work in packet interception mode using RIPv2.
第23题:
The rate of traffic is measured and compared to a configured policy.
Classification is used to differentiate traffic.
Traffic is marked and sent out according to priority.
Both can be applied to inbound and outbound traffic.
Both buffer traffic to ensure a predetermined traffic rate.
Both drop traffic that is above a predetermined traffic rate.
第24题:
Voice Traffic uses Assured Forwarding
Voice Signaling traffic uses Assured Forwarding
Voice Signaling traffic uses priority queuing
Voice Traffic uses priority queuing
Voice signaling traffic should use priority queuing with Assured Forwarding