更多“多选题What are three types of packet delays that occur in a network? ()AtimingBqueuingCdifferentialDserializationEpacketizationFpropagation”相关问题
  • 第1题:

    What are three types of packet delays that occur in a network? ()

    • A、timing
    • B、queuing
    • C、differential
    • D、serialization
    • E、packetization
    • F、propagation

    正确答案:B,D,F

  • 第2题:

    What are the two advantages of any intelligent network that uses a systems-level approach?()

    • A、 improveQos
    • B、 reduced costs for all types of users
    • C、 packet inspection at wire speed
    • D、 reduced complexity

    正确答案:B,D

  • 第3题:

    Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()

    • A、It is the Routing protocol used between ATM switches
    • B、PNNI uses the same Dijsktra algorithm for SPF calculation
    • C、PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
    • D、PNNI measures line capacities and delays in addition to simple cost metrics

    正确答案:A,B,D

  • 第4题:

    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()

    • A、FTP
    • B、Telnet
    • C、SMTP
    • D、DNS
    • E、HTTP
    • F、POP3

    正确答案:D,E,F

  • 第5题:

    多选题
    Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()
    A

    policy routing

    B

    increase link capacity

    C

    WRED

    D

    CBWFQ

    E

    LFI

    F

    WFQ


    正确答案: E,F
    解析: 暂无解析

  • 第6题:

    多选题
    A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()
    A

    informational

    B

    emergency

    C

    warning

    D

    critical 

    E

    debug

    F

    error


    正确答案: E,C
    解析: 暂无解析

  • 第7题:

    多选题
    Which three statements about end-to-end delay are true? ()
    A

    End-to-end delay is the sum of propagation delays, processing delays, serialization delays, and queuing delays.

    B

    Coast-to-coast end-to-end delay over an optical link is about 20 ms.

    C

    Processing delay depends on various factors, which include CPU speed, CPU utilization, IP switching mode, and router architecture.

    D

    Propagation and serialization delays are related to the media.

    E

    Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).

    F

    Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.


    正确答案: A,B
    解析: 暂无解析

  • 第8题:

    多选题
    Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()
    A

    It is the Routing protocol used between ATM switches

    B

    PNNI uses the same Dijsktra algorithm for SPF calculation

    C

    PNNI and OSPF use the same Database to make cohesive decision for packet forwarding

    D

    PNNI measures line capacities and delays in addition to simple cost metrics


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    What are three types of packet delays that occur in a network? ()
    A

    timing

    B

    queuing

    C

    differential

    D

    serialization

    E

    packetization

    F

    propagation


    正确答案: F,C
    解析: 暂无解析

  • 第10题:

    多选题
    What are the 2 types of interfaces in an NPIV mode network topology?()
    A

    Local

    B

    Server

    C

    Network

    D

    Border


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: B,E
    解析: 暂无解析

  • 第12题:

    多选题
    What are three valid LDP message types?()
    A

    Path

    B

    Session

    C

    discovery

    D

    establishment

    E

    Advertisement


    正确答案: C,E
    解析: 暂无解析

  • 第13题:

    What are three features of voice traffic on a network?()

    • A、bursty
    • B、constant
    • C、bandwidth intensive
    • D、small packet sizes
    • E、time-sensitive
    • F、retransmittable

    正确答案:B,D,E

  • 第14题:

    What are three features of the Cisco IOS Firewall feature set?()

    • A、network-based application recognition (NBAR)
    • B、authentication proxy
    • C、stateful packet filtering
    • D、AAA services
    • E、proxy server
    • F、IPS

    正确答案:B,C,F

  • 第15题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第16题:

    多选题
    What are three types of routing instances?()
    A

    VPN

    B

    virtual-router

    C

    policy

    D

    VRF

    E

    forwarding


    正确答案: C,A
    解析: 暂无解析

  • 第17题:

    多选题
    Which two statements are true about network voice traffic? (Choose two.)()
    A

    Voice traffic is affected more by link speed than FTP traffic is.

    B

    Voice traffic is affected more by packet delays than FTP traffic is.

    C

    Voice streams involve larger packet sizes than most TCP network traffic involves.

    D

    Voice traffic is more sensitive to packet loss than TCP network traffic is.

    E

    Voice traffic requires QOS mechanisms only in heavily loaded network segments.


    正确答案: A,D
    解析: 暂无解析

  • 第18题:

    多选题
    What are three features of voice traffic on a network?()
    A

    bursty

    B

    constant

    C

    bandwidth intensive

    D

    small packet sizes

    E

    time-sensitive

    F

    retransmittable


    正确答案: B,F
    解析: 暂无解析

  • 第19题:

    多选题
    What are three valid LDP message types? ()(Choose three.)
    A

    peer discovery

    B

    label distribution

    C

    path initialization

    D

    session management

    E

    connection establishment


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()
    A

    The authenticator is not licensed to support Junos Pulse.

    B

    The authenticator did not receive the EAP-response/identity packet.

    C

    The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.

    D

    The authenticator is sending the request over its loopback interface.

    E

    The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()
    A

    policy routing

    B

    increase link capacity

    C

    WRED

    D

    CBWFQ

    E

    LFI

    F

    WFQ


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: A,E
    解析: 暂无解析

  • 第23题:

    多选题
    For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
    A

    Compress payload.

    B

    Use header compression.

    C

    Increase link capacity.

    D

    Use random early detection.

    E

    Guarantee bandwidth to fragile flows.

    F

    Implement network-based application recognition.


    正确答案: E,D
    解析: 暂无解析

  • 第24题:

    多选题
    What are three valid Juniper Networks IPS attack object types?() (Choose three.)
    A

    signature

    B

    anomaly

    C

    trojan

    D

    virus

    E

    chain


    正确答案: A,D
    解析: 暂无解析