单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()Ashow asp dropBshow counters dropCshow security-policyDshow policy-map

题目
单选题
The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()
A

 show asp drop

B

 show counters drop

C

 show security-policy

D

 show policy-map


相似考题
更多“The number of packets (or flows) dropped because they do not”相关问题
  • 第1题:

    Refer to the exhibit. Which two statements are true?()

    A. DHCPDISCOVER packets will reach the DHCP server.

    B. The router will not forward DHCPDIS COVER packets because it has not been configured to do so.

    C. This configuration is applied to interface Fa0/1.

    D. DHCPDISCOVER packets will not reach the DHCP server because DHCPDISCOVER packets are broadcasts.

    E. DHCPDISCOVER packets will not reach the DHCP server because ports 67 and 68 have not been explicitly allowed by the ip forward - protocol command.

    F. This configuration is applied to interface Fa0/0.


    参考答案:A, E

  • 第2题:

    Which three statements are true about the data traffic characteristics of voice traffic? ()

    • A、latency must be kept below 150 ms
    • B、latency is not a concern as long as jitter is kept below 30 ms
    • C、voice packets do not require a specific type of queuing
    • D、voice packets are rather small
    • E、voice packets require TCP for rapid retransmission of dropped packets
    • F、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

    正确答案:A,D,F

  • 第3题:

    You are maintaining your database in Oracle10g. You are performing an incomplete recovery because the tablespace, DATA1, was dropped and purged from the Recycle Bin. After performing an incomplete recovery, you open the database with the RESETLOGS option.  What will NOT be the impact of using the RESETLOGS option?()

    • A、 The log sequence for the database will restart from 1.
    • B、 The log sequence number will be written to the control file.
    • C、 The log sequence number will be written to the datafile headers.
    • D、 The log sequence number will be written to the initialization parameter file.

    正确答案:D

  • 第4题:

    When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()

    • A、the number of packets that are discarded because they exceed the maximum packet size of the medium
    • B、errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
    • C、the number of packets that are discarded because they are smaller than the minimum packet size of the medium
    • D、the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
    • E、the number of times that the interface requested another interface within the router to slow down

    正确答案:C

  • 第5题:

    The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()

    • A、 show asp drop
    • B、 show counters drop
    • C、 show security-policy
    • D、 show policy-map

    正确答案:A

  • 第6题:

    Why is QoS important in a converged network?()

    • A、Because data does not need to arrive intact, so data transfer rates can be variable
    • B、Because lost voice-data packets must be retransmitted
    • C、Because voice data packets should arrive quickly and sequentially, and with no lost data
    • D、Because voice data packets must follow a single dedicated path through the network

    正确答案:C

  • 第7题:

    Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems?()

    • A、CBWFQ
    • B、LLQ
    • C、traffic shaping
    • D、WRED

    正确答案:B,D

  • 第8题:

    单选题
    Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()
    A

    Perform Export before TSPITR and Import after TSPITR

    B

    Move objects to another schema that has the same tablespace assigned

    C

    Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)

    D

    Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true about the data traffic characteristics of voice traffic? ()
    A

    latency must be kept below 150 ms

    B

    latency is not a concern as long as jitter is kept below 30 ms

    C

    voice packets do not require a specific type of queuing

    D

    voice packets are rather small

    E

    voice packets require TCP for rapid retransmission of dropped packets

    F

    voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is the primary consideration to scale VPNs?()
    A

     packets per second

    B

     number of remote sites

    C

     throughput bandwidth

    D

     number of tunnels


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    What two statistics appear in show frame-relay map output?()
    A

    The number of FECN packets that are received by the router

    B

    The number of BECN packets that are received by the router

    C

    The ip address of the local router

    D

    The value of the local DLCI

    E

    The status of the PVC that is configured on the router


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    单选题
    The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()
    A

     show asp drop

    B

     show counters drop

    C

     show security-policy

    D

     show policy-map


    正确答案: C
    解析: 暂无解析

  • 第13题:

    What two statistics appear in show frame-relay map output?()

    A. The number of FECN packets that are received by the router

    B. The number of BECN packets that are received by the router

    C. The ip address of the local router

    D. The value of the local DLCI

    E. The status of the PVC that is configured on the router


    参考答案:D, E

  • 第14题:

    Which statement is true about the comparison of voice traffic with video traffic?()

    • A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
    • B、 Latency requirements are less stringent for video traffic than for voice traffic.
    • C、 Video traffic is less sensitive to dropped packets than for voice traffic.
    • D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
    • E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
    • F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

    正确答案:A

  • 第15题:

    Which of the following is the primary consideration to scale VPNs?()

    • A、 packets per second
    • B、 number of remote sites
    • C、 throughput bandwidth
    • D、 number of tunnels

    正确答案:C

  • 第16题:

    What does Grade of Service (GoS) mean? ()

    • A、Number of available subscriber services
    • B、Number of unsuccessful call set-ups due to congestion
    • C、Channel utilization
    • D、Number of successful call set-ups
    • E、Number of dropped calls

    正确答案:B

  • 第17题:

    What two statistics appear in show frame-relay map output?()

    • A、The number of FECN packets that are received by the router
    • B、The number of BECN packets that are received by the router.
    • C、The ip address of the local router
    • D、The value of the local DLCI
    • E、The status of the PVC that is configured on the router

    正确答案:D,E

  • 第18题:

    What are two major sources of delay that can be managed by QoS in voice-enabled networks?()

    • A、propagation delay
    • B、voice packet serialization delay
    • C、congested egress queues
    • D、header overhead
    • E、packets dropped because of CRC errors

    正确答案:C,D

  • 第19题:

    What two statistics appear in show frame-relay map output?()

    • A、The number of FECN packets that are received by the router
    • B、The number of BECN packets that are received by the router
    • C、The ip address of the local router
    • D、The value of the local DLCI
    • E、The status of the PVC that is configured on the router

    正确答案:D,E

  • 第20题:

    单选题
    When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()
    A

    the number of packets that are discarded because they exceed the maximum packet size of the medium

    B

    errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.

    C

    the number of packets that are discarded because they are smaller than the minimum packet size of the medium

    D

    the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers

    E

    the number of times that the interface requested another interface within the router to slow down


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery,you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects.  Which option must you use to perform TSPITR and preserve the object?()
    A

     Perform Export before TSPITR and Import after TSPITR

    B

     Move objects to another schema that has the same tablespace assigned

    C

     Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)

    D

     Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about the comparison of voice traffic with video traffic?()
    A

     Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.

    B

     Latency requirements are less stringent for video traffic than for voice traffic.

    C

     Video traffic is less sensitive to dropped packets than for voice traffic.

    D

     Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.

    E

     Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.

    F

     Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.


    正确答案: E
    解析: 暂无解析

  • 第23题:

    多选题
    What are three problems with the tail drop mechanism of managing interface congestion?()
    A

    Queuing introduces equal delays for packets of the same flow, resulting in jitter.

    B

    When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.

    C

    All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.

    D

    There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.

    E

    In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.

    F

    Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping


    正确答案: C,B
    解析: 暂无解析

  • 第24题:

    单选题
    What is the best way to ensure that IKE/ISAKMP packets are not dropped when QoS is enabled on the uplink interface of the Teleworker router?()
    A

    QoS and IPSec should never be used together. 

    B

    IKE/ISAKMP packets are DiffSERV codepoint CS6, so the traffic is never dropped.

    C

    Source IKE/ISAKMP packets off the loop-back address. 

    D

    Classify IKE/ISAKMP packets so they are appropriately prioritized.


    正确答案: B
    解析: 暂无解析