网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which utility is used to assign a flow of data to a traffic class?()
A
ip profile
B
policy-list
C
classifier-list
D
rate-limit-profile
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which utility is used to assign a flow of data to a traffic class?()A ip profileB policy-listC classifier-listD rate-limit-profile” 相关考题
考题
●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing
考题
Which utility is used to assign a flow of data to a traffic class?()
A. ip profileB. policy-listC. classifier-listD. rate-limit-profile
考题
The monitor traffic command provides access to which utility?()
A.tcpdumpB.telnetC.tracerouteD.netstat
考题
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.
考题
Which three statements about NetFlow are true?()A、NetFlow records unidirectional IP traffic flow.B、NetFlow records MPLS frame flow.C、NetFlow expert is only over TCP.D、NetFlow records is only over UDP.E、NetFlow records subinterface information of traffic flow.
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A、Source Quench.B、Learning.C、Buffering.D、Windowing.E、Cut-Through.
考题
Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)() A、 The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable data encryption.B、 The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.C、 The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.D、 The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.E、 When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.
考题
Which descriptions of Netflow is correct?()A、By default,Netflow records bidirectional IP traffic flow.B、Netflow answers questions regarding IP traffic:who,what,where,when,and howC、Netflow accounts for both transit traffic and traffic destined for the router.D、Netflow returns the subinterface information in the flow records.
考题
Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A、client traffic allowed, data captured on all channelsB、client traffic allowed, data captured on a single channelC、no client traffic allowed, data captured on a single channelD、no client traffic allowed, data captured on all channels
考题
Which NetFlow version should be used to collect accounting data for IPv6 traffic?()A、version 1B、version 5C、version 7D、version 8E、version 9
考题
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication. B、 Voice traffic data flow involves large volumes of large packets. C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is. D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery. E、 Voice packets are very sensitive to delay and jitter.
考题
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above
考题
Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate
考题
Which utility is used to assign a flow of data to a traffic class?()A、ip profileB、policy-listC、classifier-listD、rate-limit-profile
考题
单选题Which BGP attribute can be used to influence inbound traffic flow?()A
cluster IDB
WeightC
MEDD
local preferenceE
aggregate
考题
多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.
考题
多选题VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()AVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.BVoice traffic data flow involves large volumes of large packets.CBecause a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.DVoice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.EVoice packets are very sensitive to delay and jitter.
考题
单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A
snoopB
tcpdumpC
monitorD
tail
考题
单选题Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A
client traffic allowed, data captured on all channelsB
client traffic allowed, data captured on a single channelC
no client traffic allowed, data captured on a single channelD
no client traffic allowed, data captured on all channels
考题
单选题The monitor traffic command provides access to which utility?()A
tcpdumpB
telnetC
tracerouteD
netstat
考题
多选题Which descriptions of Netflow is correct?()ABy default,Netflow records bidirectional IP traffic flow.BNetflow answers questions regarding IP traffic:who,what,where,when,and howCNetflow accounts for both transit traffic and traffic destined for the router.DNetflow returns the subinterface information in the flow records.
考题
多选题Which three statements about NetFlow are true?()ANetFlow records unidirectional IP traffic flow.BNetFlow records MPLS frame flow.CNetFlow expert is only over TCP.DNetFlow records is only over UDP.ENetFlow records subinterface information of traffic flow.
考题
多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.
考题
多选题Which two statements are true about voice packets in a LAN? (Choose two.) ()AVoice traffic data flow involves large volumes of large packets.BBecause a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.CVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.DVoice packets are very sensitive to delay and jitter.EVoice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
考题
单选题Which NetFlow version should be used to collect accounting data for IPv6 traffic?()A
version 1B
version 5C
version 7D
version 8E
version 9
热门标签
最新试卷