更多“Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?() ”相关问题
  • 第1题:

    Which three statements accurately describe IOS Firewall configurations?()

    • A、The IP inspection rule can be applied in the inbound direction on the secured interface
    • B、The IP inspection rule can be applied in the outbound direction on the unsecured interface
    • C、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.
    • D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

    正确答案:A,B,C

  • 第2题:

    Which of the following IOS features can prevent IP spoofing attacks?()

    • A、PPP over Ethernet
    • B、Cisco Express forwarding
    • C、MPLS traffic Engineering
    • D、IS-IS routing
    • E、Unicast Reverse Path Forwarding(uRPF)

    正确答案:E

  • 第3题:

    How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()

    • A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
    • B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
    • C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
    • D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

    正确答案:B

  • 第4题:

    Which of the following is the BEST support channel for server software and hardware?()

    • A、Online troubleshooting tools
    • B、Service Level Agreement (SLA)
    • C、Vendor website
    • D、Support forums

    正确答案:C

  • 第5题:

    A two-node cluster has both a single TCP/IP heartbeat and a single non-IP serial heartbeat. TheService Level Agreement regarding the speed of cluster fallover has been updated,and Fast Disk Takeover will be implemented to meet the new Service Level Agreement.  Which of the following should be implemented to increase the reliability of Fast Disk Takeover?()  

    • A、 Disk should be mirrored across separate storage enclosures.
    • B、 Disk heartbeats should be added over multiple disk adapters.
    • C、 Disk major and minor numbers should be set as unique across nodes.
    • D、 Disk adapter queue_depth should be increased from the default values.

    正确答案:B

  • 第6题:

    单选题
    Which of the following is the MOST important consideration before making a change to a server?()
    A

     Explore the ramification of the change before implementation.

    B

     Determine the service level agreement in place before implementation.

    C

     Review the equipment disposal procedures and policies before implementation.

    D

     Notify all staff members of the planned system outage before implementation.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
    A

     reader

    B

     author

    C

     manager

    D

     designer


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    A trigger can be created on which of the following objects?()
    A

    View

    B

    Catalog Table

    C

    Stored Procedure

    D

    Global Temporary Table


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    Which three of these statements about the IP service level agreement (SLA) sender are true? ()
    A

    SLA sender target can be an IP host

    B

    SLA sender sends a probe packet and a response probe packet

    C

    SLA sender sends a probe packet

    D

    SLA sender target must be a router

    E

    SLA sender target can be an IP SLA responder


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which four statements about an IP service level agreement (SLA) are true? ()
    A

    SLA responder knows type of operation, the port used, and duration.

    B

    SLA responder inserts in and out timestamps in the packet payload.

    C

    SLA sender and responder use the IP SLA Control Protocol to communicate with each other before

    D

    SLA sender and responder communication can be encrypted.

    E

    SLA sender and responder communication can be authenticated with MD5.


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following regulates the amount of network traffic a single node receives in a servercluster?()
    A

    Load balancer

    B

    Proxy server

    C

    Content filter

    D

    Quality of service


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following is the BEST support channel for server software and hardware?()
    A

     Online troubleshooting tools

    B

     Service Level Agreement (SLA)

    C

     Vendor website

    D

     Support forums


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which three of these statements about the IP service level agreement (SLA) sender are true? ()

    • A、SLA sender target can be an IP host
    • B、SLA sender sends a probe packet and a response probe packet
    • C、SLA sender sends a probe packet
    • D、SLA sender target must be a router
    • E、SLA sender target can be an IP SLA responder

    正确答案:A,C,E

  • 第14题:

    Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

    • A、It can be used to block bulk encryption attacks
    • B、It can be used to protect against denial of service attacks
    • C、Traffic originating from the router is considered trusted, so it is not inspected
    • D、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
    • E、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

    正确答案:B,E

  • 第15题:

    Which of the following is the MOST important consideration before making a change to a server?()

    • A、Explore the ramification of the change before implementation.
    • B、Determine the service level agreement in place before implementation.
    • C、Review the equipment disposal procedures and policies before implementation.
    • D、Notify all staff members of the planned system outage before implementation.

    正确答案:A

  • 第16题:

    Which of the following can transmit block level storage over Ethernet?()

    • A、SAS
    • B、iSCSI
    • C、USB
    • D、SATA

    正确答案:B

  • 第17题:

    john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()

    • A、 reader
    • B、 author
    • C、 manager
    • D、 designer

    正确答案:D

  • 第18题:

    单选题
    Which of the following is the BEST support channel for server software and hardware?()
    A

    Online troubleshooting tools

    B

    Service Level Agreement (SLA)

    C

    Vendor website

    D

    Support forums


    正确答案: C
    解析: 暂无解析

  • 第19题:

    多选题
    Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()
    A

    ICMP Echo

    B

    VoIP (RTP)

    C

    IPX

    D

    SNMP


    正确答案: D,C
    解析: 暂无解析

  • 第20题:

    单选题
    The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()
    A

    control plane policing

    B

    data plane policing

    C

    network-based application recognition (NBAR)

    D

    service plane policing

    E

    management plane policing


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A two-node cluster has both a single TCP/IP heartbeat and a single non-IP serial heartbeat. TheService Level Agreement regarding the speed of cluster fallover has been updated,and Fast Disk Takeover will be implemented to meet the new Service Level Agreement.  Which of the following should be implemented to increase the reliability of Fast Disk Takeover?()
    A

     Disk should be mirrored across separate storage enclosures.

    B

     Disk heartbeats should be added over multiple disk adapters.

    C

     Disk major and minor numbers should be set as unique across nodes.

    D

     Disk adapter queue_depth should be increased from the default values.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
    A

    It can be used to block bulk encryption attacks

    B

    It can be used to protect against denial of service attacks

    C

    Traffic originating from the router is considered trusted, so it is not inspected

    D

    Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently

    E

    Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements accurately describe IOS Firewall configurations?()
    A

    The IP inspection rule can be applied in the inbound direction on the secured interface

    B

    The IP inspection rule can be applied in the outbound direction on the unsecured interface

    C

    The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.

    D

    For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL


    正确答案: C,B
    解析: 暂无解析