网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are true regarding AppFlow? ()(Choose two.)
A

Accelerates NFS file sharing, MAPI, and HTTP 1.0.

B

Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.

C

Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.

D

Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are true regarding AppFlow? ()(Choose two.)AAccelerates NFS file sharing, MAPI, and HTTP 1.0.BAccelerates CIFS, MAPI, and additional TCP traffic specified by app rules.CAccelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.DAccelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.” 相关考题
考题 Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 Which two statements are true regarding L2TP? ()(Choose two.) A. Tunnels are initiated by the LACB. Tunnels are initiated by the LNSC. By default, subscriber authentication occurs on the LNSD. By default, subscriber authentication occurs on the LAC

考题 Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.) A. The statistics show savings for all CIFS traffic.B. The traffic transfered over 4,000 seconds faster.C. There was a bandwidth savings of almost 68.9%.D. The acceleration is only working for 68.9% of the traffic

考题 Which two CIFS commands are accelerated by AppFlow? ()(Choose two.) A. ReadXB. Write AndXC. Trans2 QueryD. Tree Disconnect

考题 Which two statements are true regarding AppFlow? ()(Choose two.) A. Accelerates NFS file sharing, MAPI, and HTTP 1.0.B. Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.C. Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.D. Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements are true regarding AppFlow? ()(Choose two.)A、Accelerates NFS file sharing, MAPI, and HTTP 1.0.B、Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.C、Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.D、Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.

考题 Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

考题 Which two CIFS commands are accelerated by AppFlow? ()(Choose two.)A、ReadXB、Write AndXC、Trans2 QueryD、Tree Disconnect

考题 Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

考题 Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

考题 Which two statements are true with regard to policy ordering? ()(Choose two.)A、The last policy is the default policy, which allows all traffic.B、The order of policies is not important.C、New policies are placed at the end of the policy list.D、The insert command can be used to change the order.

考题 Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)A、Packet Flow AccelerationB、Network Sequence CachingC、AppFlow's MAPI accelerationD、Molecular Sequence Reduction

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)A、The statistics show savings for all CIFS traffic.B、The traffic transfered over 4,000 seconds faster.C、There was a bandwidth savings of almost 68.9%.D、The acceleration is only working for 68.9% of the traffic

考题 Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)A、Fast Connection SetupB、TCP Acceleration (AFP)C、Network Sequence CachingD、AppFlow's MAPI accelerationE、Molecular Sequence Reduction

考题 多选题Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)AThe statistics show savings for all CIFS traffic.BThe traffic transfered over 4,000 seconds faster.CThere was a bandwidth savings of almost 68.9%.DThe acceleration is only working for 68.9% of the traffic

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Which two statements are true about network voice traffic? (Choose two.)()AVoice traffic is affected more by link speed than FTP traffic is.BVoice traffic is affected more by packet delays than FTP traffic is.CVoice streams involve larger packet sizes than most TCP network traffic involves.DVoice traffic is more sensitive to packet loss than TCP network traffic is.EVoice traffic requires QOS mechanisms only in heavily loaded network segments.

考题 多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

考题 多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

考题 多选题Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)APacket Flow AccelerationBNetwork Sequence CachingCAppFlow's MAPI accelerationDMolecular Sequence Reduction

考题 多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.

考题 多选题Which two CIFS commands are accelerated by AppFlow? ()(Choose two.)AReadXBWrite AndXCTrans2 QueryDTree Disconnect

考题 多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

考题 多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.