Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()A、World Wide Web traffic using load balanced web serversB、voiceC、peer to peer applications mission critical applicationsD、peer to peer applicationsE、multic

题目

Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()

  • A、World Wide Web traffic using load balanced web servers
  • B、voice
  • C、peer to peer applications mission critical applications
  • D、peer to peer applications
  • E、multicast routing protocols

相似考题
更多“Which two traffic”相关问题
  • 第1题:

    An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()

    A.Hub

    B. Bridge

    C. Switch

    D. Router


    参考答案:C

  • 第2题:

    Which two of these are characteristics of an IPS device?()

    • A、 passively listens to network traffic
    • B、 is an active device in the traffic path
    • C、 has a permissive interface that is used to monitor networks
    • D、 traffic arrives on one IPS interface and exits on another

    正确答案:B,D

  • 第3题:

    Which two characteristics are common between traffic policing and traffic shaping?()

    • A、 The rate of traffic is measured and compared to a configured policy.
    • B、 Classification is used to differentiate traffic.
    • C、 Traffic is marked and sent out according to priority.
    • D、 Both can be applied to inbound and outbound traffic.
    • E、 Both buffer traffic to ensure a predetermined traffic rate.
    • F、 Both drop traffic that is above a predetermined traffic rate.

    正确答案:A,B

  • 第4题:

    You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

    • A、ICMP
    • B、SNMP
    • C、TCP
    • D、HTTPS

    正确答案:A,C

  • 第5题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第6题:

    An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router

    正确答案:C

  • 第7题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第8题:

    多选题
    Which two benefits are provided by creating VLANs? ()
    A

    added security

    B

    dedicated bandwidth

    C

    provides segmentation

    D

    allows switches to route traffic between subinterfaces

    E

    contains collisions


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two traffic types trigger pass-through firewall user authentication?()
    A

    SSH

    B

    Telnet

    C

    ICMP

    D

    OSPF

    E

    HTTP


    正确答案: A,E
    解析: 暂无解析

  • 第10题:

    多选题
    The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
    A

    Business-critical traffic will be sorted into two QoS classes.

    B

    Real-time traffic will be sorted into one QoS class.

    C

    Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.

    D

    All traffic except real-time will be considered best-effort.

    E

    Routing, management, and transactional traffic will be considered business-critical.

    F

    Voice and call signaling traffic will be considered real-time.


    正确答案: F,D
    解析: 暂无解析

  • 第11题:

    多选题
    Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()
    A

    alternate

    B

    backup

    C

    designated

    D

    disabled

    E

    root


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements describe traffic policing?()
    A

    Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data

    B

    Excess traffic is buffered so that the traffic remains within the desired rate.

    C

    Packets that conform to traffic policies are not delayed.

    D

    Packet marking is available and allows excess packets to be re-marked with a lower priorit


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    Which two of these are characteristics of an IPS device?()

    A. passively listens to network traffic

    B. is an active device in the traffic path

    C. has a permissive interface that is used to monitor networks

    D. traffic arrives on one IPS interface and exits on another


    参考答案:B, D

  • 第14题:

    Which two statements describe traffic policing?()

    • A、Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
    • B、Excess traffic is buffered so that the traffic remains within the desired rate.
    • C、Packets that conform to traffic policies are not delayed.
    • D、Packet marking is available and allows excess packets to be re-marked with a lower priorit

    正确答案:C,D

  • 第15题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第16题:

    Which two traffic types trigger pass-through firewall user authentication?()

    • A、SSH
    • B、Telnet
    • C、ICMP
    • D、OSPF
    • E、HTTP

    正确答案:B,E

  • 第17题:

    Which two statements correctly identify factors to consider when Configuring WAN QoS?()

    • A、Voice Traffic uses Assured Forwarding
    • B、Voice Signaling traffic uses Assured Forwarding
    • C、Voice Signaling traffic uses priority queuing
    • D、Voice Traffic uses priority queuing
    • E、Voice signaling traffic should use priority queuing with Assured Forwarding

    正确答案:B,D

  • 第18题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第19题:

    多选题
    Which two configurations are made using the QoS Setup Wizard?() (Choose two.)
    A

    Assign applications to traffic classes.

    B

    Use ToS/DSCP values for traffic classes.

    C

    Exclude subnets from QoS management.

    D

    Select dedicated vs. over-subscribed circuits


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true for a security policy? ()(Choose two.)
    A

    It controls inter-zone traffic.

    B

    It controls intra-zone traffic.

    C

    It is named with a system-defined name.

    D

    It controls traffic destined to the device's ingress interface.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two options can be used as traffic descriptors when classifying and marking traffic? ()
    A

    incoming interface

    B

    Layer 2 differentiated services code point (DSCP)

    C

    Layer 3 IP precedence

    D

    outgoing interface


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true when source/destination filters are enabled? ()(Choose two.)
    A

    Excluded traffic is not accelerated.

    B

    Excluded traffic is only compressed.

    C

    Source/destination filter applies to all traffic sent from LAN to WAN.

    D

    Source/destination filters work in packet interception mode using RIPv2.


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two characteristics are common between traffic policing and traffic shaping?()
    A

    The rate of traffic is measured and compared to a configured policy.

    B

    Classification is used to differentiate traffic.

    C

    Traffic is marked and sent out according to priority.

    D

    Both can be applied to inbound and outbound traffic.

    E

    Both buffer traffic to ensure a predetermined traffic rate.

    F

    Both drop traffic that is above a predetermined traffic rate.


    正确答案: A,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements correctly identify factors to consider when Configuring WAN QoS?()
    A

    Voice Traffic uses Assured Forwarding

    B

    Voice Signaling traffic uses Assured Forwarding

    C

    Voice Signaling traffic uses priority queuing

    D

    Voice Traffic uses priority queuing

    E

    Voice signaling traffic should use priority queuing with Assured Forwarding


    正确答案: A,B
    解析: 暂无解析