网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which statement describes exception traffic?()
A
Exception traffic must be sent to the PFE for processing.
B
Exception traffic enters one ingress port and is sent out multiple egress ports.
C
Exception traffic is rate-limited on the internal link to prevent DoS attacks.
D
Exception traffic is processed after forwarding traffic when congestion exists.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which statement describes exception traffic?()A Exception traffic must be sent to the PFE for processing.B Exception traffic enters one ingress port and is sent out multiple egress ports.C Exception traffic is rate-limited on the internal link to prevent DoS attacks.D Exception traffic is processed after forwarding traffic when congestion exists.” 相关考题
考题
Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries
考题
Which statement describes transit traffic?()
A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C. Any traffic that requires the generation of an ICMP message.D. Traffic that requires some form of special attention and does not pass through the device.
考题
Which statement describes exception traffic?()
A. Exception traffic must be sent to the PFE for processing.B. Exception traffic enters one ingress port and is sent out multiple egress ports.C. Exception traffic is rate-limited on the internal link to prevent DoS attacks.D. Exception traffic is processed after forwarding traffic when congestion exists.
考题
Which statement describes VRRP object tracking?()
A.It monitors traffic flow and link utilization.B.It ensures the best VRRP router is the virtual router master for the group.C.It causes traffic to dynamically move to higher bandwidth linksD.It thwarts man-in-the-middle attacks.
考题
Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
考题
Which statement describes VRRP object tracking?()A、It monitors traffic flow and link utilization.B、It ensures the best VRRP router is the virtual router master for the group.C、It causes traffic to dynamically move to higher bandwidth linksD、It thwarts man-in-the-middle attacks.
考题
Which statement best describes the application of link fragmentation and interleaving (LFI)?()A、It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB、It fragments larger packets and allows VoIP packets to be transmitted in between them.C、It stops the transmission of large packets when priority packets arrive.D、It sends high priority packets in between normal traffic packets.
考题
Which the statement is true?()A、 The Error class is a Runtime Exception.B、 No exceptions are subclasses of Error.C、 Any statement that may throw an Error must be enclosed in a try block.D、 any statement that may throw an Exception must be enclosed in a try block.E、 Any statement that may throw an Runtime Exception must be enclosed in a try block.
考题
Which statement describes the PFE?()A、The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB、The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC、The PFE sends traffic to the RE for systematic packet forwardingD、The PFE receives hardware and environmental status messages from the RE
考题
Which statement is correct regarding exception traffic processing?()A、Exception traffic is only handled by the PFEB、Exception traffic is rate-limited across the internal link to protect the REC、Exception traffic is not prioritized during times of congestionD、Exception traffic is forwarded based on forwarding table entries
考题
Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()A、It is only used for exception traffic.B、It is an FE link called fxp2.C、It is rate-limited to avoid DDOS attacks.D、It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
考题
Which statement describes transit traffic?()A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C、Any traffic that requires the generation of an ICMP message.D、Traffic that requires some form of special attention and does not pass through the device.
考题
Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.
考题
Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
考题
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
Which four types of object can be thrown using the throw statement?()A、 ErrorB、 EventC、 ObjectD、 ExceptionE、 ThrowableF、 Runtime Exception
考题
单选题Which statement describes VRRP object tracking?()A
It monitors traffic flow and link utilization.B
It ensures the best VRRP router is the virtual router master for the group.C
It causes traffic to dynamically move to higher bandwidth linksD
It thwarts man-in-the-middle attacks.
考题
单选题Which the statement is true?()A
The Error class is a Runtime Exception.B
No exceptions are subclasses of Error.C
Any statement that may throw an Error must be enclosed in a try block.D
any statement that may throw an Exception must be enclosed in a try block.E
Any statement that may throw an Runtime Exception must be enclosed in a try block.
考题
单选题Which statement describes exception traffic?()A
Exception traffic must be sent to the PFE for processing.B
Exception traffic enters one ingress port and is sent out multiple egress ports.C
Exception traffic is rate-limited on the internal link to prevent DoS attacks.D
Exception traffic is processed after forwarding traffic when congestion exists.
考题
单选题Which statement describes the PFE?()A
The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB
The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC
The PFE sends traffic to the RE for systematic packet forwardingD
The PFE receives hardware and environmental status messages from the RE
考题
单选题Which statement describes transit traffic?()A
Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B
Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C
Any traffic that requires the generation of an ICMP message.D
Traffic that requires some form of special attention and does not pass through the device.
考题
单选题Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A
A router interface can belong to multiple zones.B
Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C
The pass action works in only one directionD
A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
考题
单选题Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()A
It is only used for exception traffic.B
It is an FE link called fxp2.C
It is rate-limited to avoid DDOS attacks.D
It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
考题
单选题Which statement best describes the application of link fragmentation and interleaving (LFI)?()A
It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB
It fragments larger packets and allows VoIP packets to be transmitted in between them.C
It stops the transmission of large packets when priority packets arrive.D
It sends high priority packets in between normal traffic packets.
考题
单选题Which statement is correct regarding exception traffic processing?()A
Exception traffic is only handled by the PFEB
Exception traffic is rate-limited across the internal link to protect the REC
Exception traffic is not prioritized during times of congestionD
Exception traffic is forwarded based on forwarding table entries
考题
单选题Which statement describes the behavior of a security policy?()A
The implicit default security policy permits all traffic.B
Traffic destined to the device itself always requires a security policy.C
Traffic destined to the device’s incoming interface does not require a security policy.D
The factory-default configuration permits all traffic from all interfaces.
考题
多选题Which four types of object can be thrown using the throw statement?()AErrorBEventCObjectDExceptionEThrowableFRuntime Exception
考题
单选题Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?()A
Switchover ensures that Layer 2 through Layer 4 traffic is not interruptedB
Redundancy requires BGP, OSPF, EIGRP, or IS-ISC
Redundancy provides fast supervisor switchover for all Cisco Catalyst 6500 series switchesD
Switchover can be caused by clock synchronization failure between supervisors
热门标签
最新试卷