It is bidirectional.
It carries optimized traffic.
It can carry traffic using UDP.
It is formed only within a community
第1题:
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
第2题:
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
第3题:
Which three can be specified within an RSVP session attribute object?() (Choose three.)
第4题:
What are three characteristics of a service tunnel? ()(Choose three.)
第5题:
It can make a slow network faster
It can prioritize latency-sensitive traffic
It can elimitane congestion
It can control congestion
It can allocate bandwidth for different classes of traffic
第6题:
It is bidirectional.
It carries optimized traffic.
It can carry traffic using UDP.
It is formed only within a community
第7题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第8题:
throughput
performance
pass-through
application summary
packet size distribution
第9题:
It can run entirely on the Internet.
A minimum of two modules needs to be implemented for an organization.
It is engineered to work as an integrated system on a single IT infrastructure.
It supports multi-directional flows of business information within an organization.
第10题:
NSC operates at the file level.
NSC operates at the byte level.
NSC uses hard drives to store longer patterns.
NSC retains learned patterns for a longer time.
NSC is available only on platforms with dual hard drives.
第11题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第12题:
It can make a slow network faster.
It can prioritize latency-sensitive traffic.
It can eliminate congestion.
It can control congestion.
It can allocate bandwidth for different classes of traffic.
第13题:
What are three methods to apply a L2TP Tunnel Switch Profile? ()(Choose three.)
第14题:
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。
第15题:
Which three advanced permit actions within security policies are valid?() (Choose three.)
第16题:
Which three statements are true about a registration server in a community?() (Choose three.)
第17题:
protocol
VLAN number
TCP or UDP port numbers
source switch port number
source IP address and destination IP address
source MAC address and destination MAC address
第18题:
It is a hub device installed in the community.
A community can have one or more registration servers.
It shows the serial numbers of all devices in the community.
It stores network and community information for each device.
It is required for tunnel formation between different WX devices in the same community.
第19题:
VLAN support
compression
authentication
sliding windows
multilink support
quality of service
第20题:
It protects signals against node failures between rings.
It protects signals against node failure within a single ring.
It allows for traffic to be preempted when a ring switch occurs.
Traffic can be dropped and continued at interconnecting nodes.
It protects preemptible traffic from being dropped when a ring switch occurs.
第21题:
aaa domain-map
radius attributes
tunnel groups
tunnel services profile
l2tp destination profile
第22题:
dispersion
Optical SNR
span attenuation
four wave mixing
receiver sensitivity
第23题:
hold priority
setup priority
FEC IP address
resource availability
local protection option
第24题:
profile
policy list
domain map
RADIUS VSA
classifier ACL