网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
In which three network technologies is traffic shaping used to prevent and manage congestion? ()
A
Asynchronous Transfer Mode (ATM)
B
data-link switching (DLSw)
C
Route Processor Redundancy (RPR)
D
Frame Relay (FR)
E
Metro Ethernet
F
Multiprotocol Label Switching (MPLS)
参考答案
参考解析
解析:
暂无解析
更多 “多选题In which three network technologies is traffic shaping used to prevent and manage congestion? ()AAsynchronous Transfer Mode (ATM)Bdata-link switching (DLSw)CRoute Processor Redundancy (RPR)DFrame Relay (FR)EMetro EthernetFMultiprotocol Label Switching (MPLS)” 相关考题
考题
Which three SONET network elements are used for troubleshooting?()
A.lineB.pathC.circuitD.sectionE.segment
考题
Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)
A. Load balancingB. Caching enginesC. QosD. Fault tolerance systemsE. Traffic shaping
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A.SwitchB.HubC.ModemD.Repeater
考题
Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm
考题
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
考题
Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.
考题
Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network
考题
Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning
考题
Which three are characteristics of voice traffic in the Company VOIP campus network?()A、TCP retransmitsB、UDP priorityC、BurstyD、Delay sensitiveE、GreedyF、Drop sensitive
考题
Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library
考题
Which Cisco IOS traffic-shaping mechanism statement is true? ()A、class-based policing is configured using the Modular QoS command-line (MQC)B、only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN linksC、Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configurationD、both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic
考题
Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()A、protocol typeB、CoSC、DSCPD、IP precedenceE、destination addressF、input interface
考题
In which three network technologies is traffic shaping used to prevent and manage congestion? ()A、Asynchronous Transfer Mode (ATM)B、data-link switching (DLSw)C、Route Processor Redundancy (RPR)D、Frame Relay (FR)E、Metro EthernetF、Multiprotocol Label Switching (MPLS)
考题
Which three characteristics are true about voice traffic in the campus network? ()A、TCP retransmitsB、benignC、greedyD、drop sensitiveE、smoothF、delay insensitive
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)A、Load balancingB、Caching enginesC、QosD、Fault tolerance systemsE、Traffic shaping
考题
Which three SONET network elements are used for troubleshooting?()A、lineB、pathC、circuitD、sectionE、segment
考题
多选题Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()Aprotocol typeBCoSCDSCPDIP precedenceEdestination addressFinput interface
考题
多选题Which three characteristics are true about voice traffic in the campus network? ()ATCP retransmitsBbenignCgreedyDdrop sensitiveEsmoothFdelay insensitive
考题
多选题Which three are characteristics of voice traffic in the Company VOIP campus network?()ATCP retransmitsBUDP priorityCBurstyDDelay sensitiveEGreedyFDrop sensitive
考题
多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
考题
多选题Which three SONET network elements are used for troubleshooting?()AlineBpathCcircuitDsectionEsegment
考题
多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.
考题
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
热门标签
最新试卷