考题
Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm
考题
Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.
考题
Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.
考题
Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library
考题
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
考题
Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.
考题
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source
考题
Which traffic descriptor is used for marking? ()A、weighted RED (WRED) orange or green labelsB、modular QoS CLI (MQC) application layer tagsC、Deficit Round Robin (DRR) precedence bitsD、header compression tagsE、MPLS experimental bitsF、FIFO Layer 2 descriptor labels (L2DL)
考题
Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
考题
单选题Which traffic descriptor is used for marking? ()A
weighted RED (WRED) orange or green labelsB
modular QoS CLI (MQC) application layer tagsC
Deficit Round Robin (DRR) precedence bitsD
header compression tagsE
MPLS experimental bitsF
FIFO Layer 2 descriptor labels (L2DL)
考题
多选题Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()AICMP EchoBVoIP (RTP)CIPXDSNMP
考题
单选题Which BGP attribute can be used to influence inbound traffic flow?()A
cluster IDB
WeightC
MEDD
local preferenceE
aggregate
考题
单选题Which statement about HTTPS decryption on the WSA is true?()A
if enabled, all HTTPS traffic must be decryptedB
if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC
decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD
object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
多选题Which of the following can be an expected outcome of a VLAN?()AVLANs logically divide a switch into multiple, independent switches at Layer 2.BTrunk links can carry traffic for multiple VLANs.CVLAN implementation significantly increases traffic due to added trunking information.DVLANs can span multiple switches.EVLANs typically decrease the number of switches needed
考题
多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface
考题
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A
authorizationB
data integrityC
confidentialityD
authentication
考题
多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
考题
单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()A
NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.B
NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C
NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.D
NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
考题
单选题Which attribute can influence inbound traffic flows from a neighboring AS?()A
AggregatorB
Local preferenceC
Atomic aggregateD
Multiple exit discriminator
考题
多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.
考题
多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard
考题
多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.
考题
多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.