Traffic that does not match any route in the forwarding table.
Traffic that exceeds the bandwidth of the interface.
Traffic of unsupported protocols on that interface.
Traffic arriving on unknown virtual-circuits on that interface.
第1题:
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
第2题:
Which three statements about bidirectional PIM are true?()
第3题:
Which two of these are characteristics of an IPS device?()
第4题:
What does the interface subcommand switchport voice vlan 222 indicate?()
第5题:
Which statement describes transit traffic?()
第6题:
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()
第7题:
In JUNOS software, which command is used to configure TED support for OSPF?()
第8题:
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
第9题:
Voice traffic will be assigned 47% of the interface bandwidth.
Voice call signaling will be assigned 33% of the interface bandwidth.
Telnet, SSH, and other traffic that is generated to manage the router is assigned 5% of the interface bandwidth.
Best-effort traffic will be assigned 38% of the interface bandwidth.
Routing protocol traffic will be assigned 5% of the interface bandwidth.
Transactional traffic will be assigned 5% of the interface bandwidth.
第10题:
The port is configured for both data and voice traffic.
The port is fully dedicated to forwarding voice traffic.
The port will operate as an FXS telephony port.
Voice traffic will be redirected to VLAN 222.
第11题:
The traffic will be rejected
The traffic will be dropped
The traffic will be forwarded
The traffic will be policed
第12题:
set protocols rsvp cspf-enable
set protocols mpls cspf-enable
set protocols rsvp traffic-engineering
set protocols ospf traffic-engineering
第13题:
Which two statements are true about traffic shaping and traffic policing?()
第14题:
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
第15题:
Which two statements about WRED are true? ()
第16题:
Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
第17题:
Which statement describes the behavior of a security policy?()
第18题:
What are the steps for configuring stateful NBAR for dynamic protocols?()
第19题:
Which two conditions will cause switch-to-wire to occur? ()(Choose two.)
第20题:
DNS traffic is denied.
Telnet traffic is denied.
SMTP traffic is denied.
Ping traffic is permitted
第21题:
both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
both traffic shaping and traffic policing support the marking and re-marking of traffic
the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
traffic shaping queues excess traffic whereas traffic policing discards excess traffic
traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
第22题:
use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
configure video streaming. Configure audio streaming. Attach the codec to an interface
第23题:
Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.
Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
Configure video streaming. Configure audio streaming. Attach the codec to an interface.
第24题:
Traffic that does not match any route in the forwarding table.
Traffic that exceeds the bandwidth of the interface.
Traffic of unsupported protocols on that interface.
Traffic arriving on unknown virtual-circuits on that interface.