What are two purposes of a forwarding class?()A、to identify traffic that should be droppedB、to classify trafficC、to identify traffic that should receive common treatmentD、to assign traffic to output queues

题目

What are two purposes of a forwarding class?()

  • A、to identify traffic that should be dropped
  • B、to classify traffic
  • C、to identify traffic that should receive common treatment
  • D、to assign traffic to output queues

相似考题
更多“What are two purposes of a forwarding class?()A、to identify traffic that should be droppedB、to classify trafficC、to identify traffic that should receive common treatmentD、to assign traffic to output queues”相关问题
  • 第1题:

    What are some general guidelines regarding the placement of access control lists?()

    A. You should place standard ACLS as close as possible to the source of traffic to be denied.

    B. You should place extended ACLS as close as possible to the source of traffic to be denied.

    C. You should place standard ACLS as close as possible to the destination of traffic to be denied.

    D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


    参考答案:B, C

  • 第2题:

    Which MQC-based output queueing method is designed to support multiple traffic classes including VoIPtraffic, mission-critical traffic, bulk traffic, interactive traffic and default class traffic?()

    • A、Custom Queueing
    • B、CB-WRED
    • C、WRR Queueing
    • D、LLQ
    • E、CBWFQ

    正确答案:D

  • 第3题:

    What are two steps needed to define a QoS policy for a traffic class?()

    • A、 Determine a minimum bandwidth guarantee.
    • B、 Determine interfaces to which to apply policy.
    • C、 Assign priorities to the class.
    • D、 Configure access control lists.

    正确答案:A,C

  • 第4题:

    Which two statements correctly identify factors to consider when Configuring WAN QoS?()

    • A、Voice Traffic uses Assured Forwarding
    • B、Voice Signaling traffic uses Assured Forwarding
    • C、Voice Signaling traffic uses priority queuing
    • D、Voice Traffic uses priority queuing
    • E、Voice signaling traffic should use priority queuing with Assured Forwarding

    正确答案:B,D

  • 第5题:

    What are two functions associated with JUNOS software class of service?()

    • A、Log incoming traffic.
    • B、Manage ingress bandwidth.
    • C、Mark packets for special handling.
    • D、Manage congestion by intelligently dropping traffic.
    • E、Classify Frame Relay QoS packets into an equivalent OP CoS environment.

    正确答案:C,D

  • 第6题:

    What are the contents of a scheduler?()

    • A、A scheduler contains parameters that describe how a queue should be serviced.
    • B、A scheduler contains traffic that is ready to be transmitted.
    • C、A scheduler contains forwarding classes that allow traffic to be forwarded.
    • D、A scheduler contains a map between the classification of a packet and its forwarding class.

    正确答案:A

  • 第7题:

    What are two purposes of a forwarding class?()

    • A、to rewrite the ToS bits in the IP header
    • B、to classify traffic
    • C、to identify traffic that should receive commom treatment
    • D、to assign traffic to output queues

    正确答案:C,D

  • 第8题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第9题:

    多选题
    Which two statements are true about traffic shaping and traffic policing?()
    A

    both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP

    B

    both traffic shaping and traffic policing support the marking and re-marking of traffic

    C

    the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic

    D

    traffic shaping queues excess traffic whereas traffic policing discards excess traffic

    E

    traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
    A

    VPN Traffic

    B

    DNS Traffic

    C

    LDAP Traffic

    D

    HTTP Traffic

    E

    HTTPS Traffic

    F

    Traffic from the network address of 192.168.10/24


    正确答案: D,F
    解析: 暂无解析

  • 第11题:

    多选题
    What are two purposes of a forwarding class?()
    A

    to rewrite the ToS bits in the IP header

    B

    to classify traffic

    C

    to identify traffic that should receive commom treatment

    D

    to assign traffic to output queues


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    单选题
    What are the contents of a scheduler?()
    A

    A scheduler contains parameters that describe how a queue should be serviced.

    B

    A scheduler contains traffic that is ready to be transmitted.

    C

    A scheduler contains forwarding classes that allow traffic to be forwarded.

    D

    A scheduler contains a map between the classification of a packet and its forwarding class.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two statements are true about traffic shaping and traffic policing?()

    • A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
    • B、both traffic shaping and traffic policing support the marking and re-marking of traffic
    • C、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
    • D、traffic shaping queues excess traffic whereas traffic policing discards excess traffic
    • E、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

    正确答案:C,D

  • 第14题:

    What are two step needed to define a QoS policy for a traffic class?()

    • A、determine a minimum bandwidth guarantee
    • B、determine interfaces to which to apply policy
    • C、assign priorities to the class
    • D、configure access control lists

    正确答案:A,C

  • 第15题:

    Which two statements are true about trust boundaries?()

    • A、Classifying and marking traffic should be done as close to the traffic source as possible. 
    • B、Classifying and marking traffic should be done at the distribution layer.
    • C、Traffic is classified and marked as it travels through the network.
    • D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
    • E、The trust boundary moves depending on the type of traffic entering the network.

    正确答案:A,D

  • 第16题:

    A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()

    • A、Block both IRC and ICMP
    • B、Utilize SNMP to identify IM users
    • C、Contact the IM carrier to request the IM account be disabled
    • D、Change the shaping setting to allow minimal traffic to reduce port hopping

    正确答案:D

  • 第17题:

    What is the purpose of unicast reverse path forwarding?()

    • A、to validate packet receipt on interfaces where the traffic should be received
    • B、to forward packets out the interfaces where the traffic should be received
    • C、to forward packets out the interfaces where the traffic should be sent
    • D、to validate packet receipt on interfaces where the traffic should be sent

    正确答案:A

  • 第18题:

    What are three functions associated with JUNOS software class of service?()

    • A、Log incoming traffic.
    • B、Classify incoming packets.
    • C、Manage outbound bandwidth.
    • D、Manage congestion by intelligently dropping traffic.
    • E、Classify ATM QoS packets into an equivalent IP CoS environment.

    正确答案:B,C,D

  • 第19题:

    You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()

    • A、VPN Traffic
    • B、DNS Traffic
    • C、LDAP Traffic
    • D、HTTP Traffic
    • E、HTTPS Traffic
    • F、Traffic from the network address of 192.168.10/24

    正确答案:A,C,D,E

  • 第20题:

    多选题
    What are two purposes of a forwarding class?()
    A

    to identify traffic that should be dropped

    B

    to classify traffic

    C

    to identify traffic that should receive common treatment

    D

    to assign traffic to output queues


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    单选题
    Which MQC-based output queueing method is designed to support multiple traffic classes including VoIPtraffic, mission-critical traffic, bulk traffic, interactive traffic and default class traffic?()
    A

    Custom Queueing

    B

    CB-WRED

    C

    WRR Queueing

    D

    LLQ

    E

    CBWFQ


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true about trust boundaries?()
    A

    Classifying and marking traffic should be done as close to the traffic source as possible.

    B

    Classifying and marking traffic should be done at the distribution layer.

    C

    Traffic is classified and marked as it travels through the network.

    D

    If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.

    E

    The trust boundary moves depending on the type of traffic entering the network.


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements correctly identify factors to consider when Configuring WAN QoS?()
    A

    Voice Traffic uses Assured Forwarding

    B

    Voice Signaling traffic uses Assured Forwarding

    C

    Voice Signaling traffic uses priority queuing

    D

    Voice Traffic uses priority queuing

    E

    Voice signaling traffic should use priority queuing with Assured Forwarding


    正确答案: C,D
    解析: 暂无解析