What are three reasons to collect Netflow data on a company network?()A.To identify applications causing congestionB.To authorize user network accessC.To report and alert link up / down instances.D.To diagnose slow network performance, bandwidth hogs, and

题目
What are three reasons to collect Netflow data on a company network?()

A.To identify applications causing congestion

B.To authorize user network access

C.To report and alert link up / down instances.

D.To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.

E.To detect suboptimal routing in the network.

F.To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.


相似考题
更多“What are three reasons to collect Netflow data on a company network?() ”相关问题
  • 第1题:

    What are three reasons to collect Netflow data on a company network?()

    • A、To identify applications causing congestion
    • B、To authorize user network access
    • C、To report and alert link up / down instances.
    • D、To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.
    • E、To detect suboptimal routing in the network.
    • F、To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

    正确答案:A,D,F

  • 第2题:

    Cisco IOS NetFlow gathers data that can be used in which three of these? ()

    • A、 accounting
    • B、 authentication
    • C、 authorization
    • D、 network monitoring
    • E、 network planning

    正确答案:A,D,E

  • 第3题:

    In the three-layer hierarchical network design model;what’s associated with the access layer?()

    • A、optimized transport structure
    • B、high port density
    • C、boundary definition
    • D、data encryption
    • E、local VLANs
    • F、route summaries

    正确答案:B,E

  • 第4题:

    You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?()

    • A、NBAR examines data in Layers 1 and 4.
    • B、NBAR examines data in Layers 3 and 4.
    • C、NetFlow examines data in Layers 3 and 4.
    • D、NBAR examines data in Layers 2 through 4.

    正确答案:B

  • 第5题:

    DCNM is capable of monitoring the network performance of a SAN. What are the three primary areas of this operation? ()  

    • A、 analyze traffic, device management, and network monitoring
    • B、 DCNM-SAN, DCNM-LAN, and device manager
    • C、 definition of flows, information collection, and data presentation
    • D、 SNMP poll data, MIB analysis, and report generation

    正确答案:C

  • 第6题:

    A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()

    • A、hub
    • B、router
    • C、switch
    • D、STP
    • E、subinterfaces
    • F、VLAN

    正确答案:C,F

  • 第7题:

    What are three purposes of the RMAN “FROM” clause?()

    • A、to support PUSH-based active database duplication
    • B、to support synchronization of a standby database with the primary database in a Data environment
    • C、To support PULL-based active database duplication
    • D、To support file restores over the network in a Data Guard environment
    • E、To support file recovery over the network in a Data Guard environment

    正确答案:B,C,E

  • 第8题:

    多选题
    What are three factors a network administrator must consider before implementing Netflow in the network?()
    A

    CPU utilization

    B

    where Netflow data will be sent

    C

    number of devices exporting Netflow data

    D

    port availability

    E

    SNMP version

    F

    WAN encapsulation


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    多选题
    What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow?()
    A

    source IP address

    B

    source MAC address

    C

    egress interface

    D

    ingress interface

    E

    destination IP address

    F

    IP next-hop


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    多选题
    A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。
    A

    hub

    B

    router

    C

    switch

    D

    STP

    E

    subinterfaces

    F

    VLAN


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    单选题
    You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()
    A

     NBAR examines data in Layers 1 and 4.

    B

     NBAR examines data in Layers 3 and 4.

    C

     NetFlow examines data in Layers 3 and 4.

    D

     NBAR examines data in Layers 2 through 4.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Cisco IOS NetFlow gathers data that can be used in which three of these? ()
    A

    accounting

    B

    authentication

    C

    authorization

    D

    network monitoring

    E

    network planning


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow?()

    • A、source IP address
    • B、source MAC address
    • C、egress interface
    • D、ingress interface
    • E、destination IP address
    • F、IP next-hop

    正确答案:A,D,E

  • 第14题:

    What are the benefit of using Netflow?()

    • A、Network, Application & User Monitoring
    • B、Network Planning
    • C、Security Analysis
    • D、Accounting/Billing

    正确答案:A,C

  • 第15题:

    What are three factors a network administrator must consider before implementing Netflow in the network?()

    • A、CPU utilization
    • B、where Netflow data will be sent
    • C、number of devices exporting Netflow data
    • D、port availability
    • E、SNMP version
    • F、WAN encapsulation

    正确答案:A,B,C

  • 第16题:

    A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()

    • A、hub
    • B、router
    • C、switch
    • D、STP
    • E、subinterfaces
    • F、VLAN

    正确答案:C,F

  • 第17题:

    What are three valid reasons to assign ports to VLANs on a switch? ()

    • A、to make VTP easier to implement
    • B、to isolate broadcast traffic
    • C、to increase the size of the collision domain
    • D、to allow more devices to connect to the network
    • E、to logically group hosts according to function
    • F、to increase network security

    正确答案:B,E,F

  • 第18题:

    What are key benefits of IBM Systems Director Standard Edition?()

    • A、Backup data Manage problems Monitor network system
    • B、Report problems Manage servers and virtual environment Monitor the network 
    • C、Monitor system health and network Install and manage AIX and IBM i Manage energy consumption 
    • D、Monitor system health and network Manage servers and virtual environment Collect performance data

    正确答案:B

  • 第19题:

    You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()

    • A、Use a debug version of NewApp to collect information about NewApp.
    • B、Use Performance Monitor to collect data about the saturation of each WAN link.
    • C、Use Network Monitor to analyze the data that is transmitted over the network for App1.
    • D、Install SNMP on all computers that are connected to App1 to obtain information about App1.
    • E、Build a test environment for NewApp to analyze how much bandwidth is required for NewApp.

    正确答案:B,C,E

  • 第20题:

    单选题
    DCNM is capable of monitoring the network performance of a SAN. What are the three primary areas of this operation? ()
    A

     analyze traffic, device management, and network monitoring

    B

     DCNM-SAN, DCNM-LAN, and device manager

    C

     definition of flows, information collection, and data presentation

    D

     SNMP poll data, MIB analysis, and report generation


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    What are three purposes of the RMAN “FROM” clause?()
    A

    to support PUSH-based active database duplication

    B

    to support synchronization of a standby database with the primary database in a Data environment

    C

    To support PULL-based active database duplication

    D

    To support file restores over the network in a Data Guard environment

    E

    To support file recovery over the network in a Data Guard environment


    正确答案: A,C
    解析: 暂无解析

  • 第22题:

    多选题
    A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()
    A

    hub

    B

    router

    C

    switch

    D

    STP

    E

    subinterfaces

    F

    VLAN


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
    A

     Create an IPsec Enforcement Network policy

    B

     Create an 802.1X enforcement network policy

    C

     Create a wired network (IEEE 802.3) Group Policy

    D

     Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy


    正确答案: A
    解析: 暂无解析