______ is not likely to be a methods of Traffic Separation.A.Separation of opposing streams of traffic by separation zones or linesB.The separation of through traffic from local traffic by provision of inshore traffic zonesC.Division of traffic from sever

题目

______ is not likely to be a methods of Traffic Separation.

A.Separation of opposing streams of traffic by separation zones or lines

B.The separation of through traffic from local traffic by provision of inshore traffic zones

C.Division of traffic from several different direction into sectors

D.Control of routing traffic through shipping routes


相似考题
更多“______ is not likely to be a methods of Traffic Separation.A.Separation of opposing stream ”相关问题
  • 第1题:

    A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?()

    A.HOST-A

    B.HOST-B

    C.HOST-C

    D.HOST-D


    参考答案:A

  • 第2题:

    Give all traffic a good safe berth obeying the Int.Rules.This wording is likely to appear in ______.

    A.Decklogs

    B.Night Orders

    C.Wheel Orders

    D.B/L


    正确答案:B

  • 第3题:

    Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()

    • A、policy routing
    • B、increase link capacity
    • C、WRED
    • D、CBWFQ
    • E、LFI
    • F、WFQ

    正确答案:B,C,D

  • 第4题:

    Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()

    • A、policy routing
    • B、increase link capacity
    • C、WRED
    • D、CBWFQ
    • E、LFI
    • F、WFQ

    正确答案:B,C,D

  • 第5题:

    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()

    • A、Inadequate RAM
    • B、Slow processor
    • C、PCI bus
    • D、Excessive network traffic

    正确答案:A

  • 第6题:

    多选题
    Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()
    A

    policy routing

    B

    increase link capacity

    C

    WRED

    D

    CBWFQ

    E

    LFI

    F

    WFQ


    正确答案: E,F
    解析: 暂无解析

  • 第7题:

    多选题
    In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()
    A

    MSDP

    B

    Routing policy

    C

    Administrative scoping

    D

    Bootstrap export policy


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
    A

    Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.

    B

    Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.

    C

    Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.

    D

    Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.

    E

    ISDN BRIs implement channel-associated signaling.


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()
    A

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.

    B

    Voice traffic data flow involves large volumes of large packets.

    C

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.

    D

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.

    E

    Voice packets are very sensitive to delay and jitter.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    Several troubleshooters are about to work on the same problem. Which of the followingtroubleshooting methods would be most appropriate to make the best use of the troubleshooters1time?()
    A

    Bottom up

    B

    Component swapping

    C

    Top down

    D

    Shoot from the hip

    E

    Divide and conquer

    F

    Follow the traffic path


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    () is not likely to be a methods of Traffic Separation.
    A

    Separation of opposing streams of traffic by separation zones or lines

    B

    The separation of through traffic from local traffic by provision of inshore traffic zones

    C

    Division of traffic from several different direction into sectors

    D

    Control of routing traffic through shipping routes


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()
    A

    policy routing

    B

    increase link capacity

    C

    WRED

    D

    CBWFQ

    E

    LFI

    F

    WFQ


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    A.IDS

    B.VPN

    C.NIPS

    D.HIDS


    参考答案:C

  • 第14题:

    Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()

    • A、MP-BGP routing
    • B、Static routing
    • C、Policy routing
    • D、Autoroute
    • E、Forwarding adjacency

    正确答案:B,C,D,E

  • 第15题:

    Several troubleshooters are about to work on the same problem. Which of the followingtroubleshooting methods would be most appropriate to make the best use of the troubleshooters1time?()

    • A、Bottom up
    • B、Component swapping
    • C、Top down
    • D、Shoot from the hip
    • E、Divide and conquer
    • F、Follow the traffic path

    正确答案:E

  • 第16题:

    Which two statements are true about the protocols that are used for transmitting voice traffic?()

    • A、RTP multiplexing is used to keep multiple phone conversations separate
    • B、RTP provides end-to-end delivery services for voice traffic.
    • C、UDP is used to ensure a reliable transmission from sender to receiver.
    • D、RTP is used to provide resource reservation for the voice stream.
    • E、UDP provides multiplexing of multiple phone conversations.

    正确答案:B,E

  • 第17题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第18题:

    多选题
    Which two statements about WRED are true? ()
    A

    WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.

    B

    Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.

    C

    WRED will throttle back voice traffic only as a last resort.

    D

    If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.

    E

    WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.

    F

    WRED treats non-IP traffic as precedence 4.


    正确答案: F,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()
    A

    MP-BGP routing

    B

    Static routing

    C

    Policy routing

    D

    Autoroute

    E

    Forwarding adjacency


    正确答案: D,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
    A

    LDP uses Down Stream On Demand.

    B

    RSVP uses Down Stream On Demand.

    C

    LDP uses Down Stream Unsolicited.

    D

    RSVP uses Down Stream Unsolicited.


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
    A

    Disable SSID

    B

    WPA

    C

    MAC filtering

    D

    RAS


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about voice packets in a LAN? (Choose two.)  ()
    A

    Voice traffic data flow involves large volumes of large packets.

    B

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.

    C

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.

    D

    Voice packets are very sensitive to delay and jitter.

    E

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.


    正确答案: B,A
    解析: 暂无解析