______ is not likely to be a methods of Traffic Separation.
A.Separation of opposing streams of traffic by separation zones or lines
B.The separation of through traffic from local traffic by provision of inshore traffic zones
C.Division of traffic from several different direction into sectors
D.Control of routing traffic through shipping routes
第1题:
A.HOST-A
B.HOST-B
C.HOST-C
D.HOST-D
第2题:
Give all traffic a good safe berth obeying the Int.Rules.This wording is likely to appear in ______.
A.Decklogs
B.Night Orders
C.Wheel Orders
D.B/L
第3题:
Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()
第4题:
Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()
第5题:
Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()
第6题:
policy routing
increase link capacity
WRED
CBWFQ
LFI
WFQ
第7题:
MSDP
Routing policy
Administrative scoping
Bootstrap export policy
第8题:
Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.
Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.
ISDN BRIs implement channel-associated signaling.
第9题:
Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.
Voice traffic data flow involves large volumes of large packets.
Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
Voice packets are very sensitive to delay and jitter.
第10题:
Bottom up
Component swapping
Top down
Shoot from the hip
Divide and conquer
Follow the traffic path
第11题:
Separation of opposing streams of traffic by separation zones or lines
The separation of through traffic from local traffic by provision of inshore traffic zones
Division of traffic from several different direction into sectors
Control of routing traffic through shipping routes
第12题:
policy routing
increase link capacity
WRED
CBWFQ
LFI
WFQ
第13题:
A.IDS
B.VPN
C.NIPS
D.HIDS
第14题:
Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()
第15题:
Several troubleshooters are about to work on the same problem. Which of the followingtroubleshooting methods would be most appropriate to make the best use of the troubleshooters1time?()
第16题:
Which two statements are true about the protocols that are used for transmitting voice traffic?()
第17题:
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
第18题:
WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.
Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.
WRED will throttle back voice traffic only as a last resort.
If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.
WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.
WRED treats non-IP traffic as precedence 4.
第19题:
MP-BGP routing
Static routing
Policy routing
Autoroute
Forwarding adjacency
第20题:
LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第21题:
Disable SSID
WPA
MAC filtering
RAS
第22题:
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP inspects traffic up to the Application layer.
IDP searches the data stream for specific attack patterns.
IDP inspects traffic up to the Presentation layer.
IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
第23题:
Voice traffic data flow involves large volumes of large packets.
Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
Voice packets are very sensitive to delay and jitter.
Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.