What are two purposes of a forwarding class?()
第1题:
A. You should place standard ACLS as close as possible to the source of traffic to be denied.
B. You should place extended ACLS as close as possible to the source of traffic to be denied.
C. You should place standard ACLS as close as possible to the destination of traffic to be denied.
D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第2题:
Which MQC-based output queueing method is designed to support multiple traffic classes including VoIPtraffic, mission-critical traffic, bulk traffic, interactive traffic and default class traffic?()
第3题:
What are two steps needed to define a QoS policy for a traffic class?()
第4题:
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
第5题:
What are two functions associated with JUNOS software class of service?()
第6题:
What are the contents of a scheduler?()
第7题:
What are two purposes of a forwarding class?()
第8题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第9题:
both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
both traffic shaping and traffic policing support the marking and re-marking of traffic
the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
traffic shaping queues excess traffic whereas traffic policing discards excess traffic
traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
第10题:
VPN Traffic
DNS Traffic
LDAP Traffic
HTTP Traffic
HTTPS Traffic
Traffic from the network address of 192.168.10/24
第11题:
to rewrite the ToS bits in the IP header
to classify traffic
to identify traffic that should receive commom treatment
to assign traffic to output queues
第12题:
A scheduler contains parameters that describe how a queue should be serviced.
A scheduler contains traffic that is ready to be transmitted.
A scheduler contains forwarding classes that allow traffic to be forwarded.
A scheduler contains a map between the classification of a packet and its forwarding class.
第13题:
Which two statements are true about traffic shaping and traffic policing?()
第14题:
What are two step needed to define a QoS policy for a traffic class?()
第15题:
Which two statements are true about trust boundaries?()
第16题:
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()
第17题:
What is the purpose of unicast reverse path forwarding?()
第18题:
What are three functions associated with JUNOS software class of service?()
第19题:
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
第20题:
to identify traffic that should be dropped
to classify traffic
to identify traffic that should receive common treatment
to assign traffic to output queues
第21题:
Custom Queueing
CB-WRED
WRR Queueing
LLQ
CBWFQ
第22题:
Classifying and marking traffic should be done as close to the traffic source as possible.
Classifying and marking traffic should be done at the distribution layer.
Traffic is classified and marked as it travels through the network.
If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
The trust boundary moves depending on the type of traffic entering the network.
第23题:
Voice Traffic uses Assured Forwarding
Voice Signaling traffic uses Assured Forwarding
Voice Signaling traffic uses priority queuing
Voice Traffic uses priority queuing
Voice signaling traffic should use priority queuing with Assured Forwarding