网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()
A

8

B

6

C

9

D

5


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A 8B 6C 9D 5” 相关考题
考题 You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

考题 You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling.Given these types of applications, how many different classes will need to be configured in QoS?()A. 8B. 6C. 9D. 5

考题 You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()A. DSCP AF21B. DSCP CS4C. DSCP AF33D. DSCP AF13

考题 Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

考题 Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer AP mode?()A、client traffic allowed, data captured on all channelsB、client traffic allowed, data captured on a single channelC、no client traffic allowed, data captured on a single channelD、no client traffic allowed, data captured on all channels

考题 You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

考题 Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()A、Create two virtual adapters on the client, each one from a separate Virtual IO ServerB、Enable dead gateway detection on the client so that the network traffic can be reroutedC、Have a spare network card on standby in the client in case the Virtual IO Server goes downD、Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Servers

考题 You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

考题 Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

考题 Which of the following is the purpose of QoS?()A、Load balance traffic across multiple LAN and WAN links.B、Increase speed of network traffic.C、Classify, mark, and prioritize traffic on WAN and LAN linksD、Guarantee traffic delivery.

考题 You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()A、VPN TrafficB、DNS TrafficC、LDAP TrafficD、HTTP TrafficE、HTTPS TrafficF、Traffic from the network address of 192.168.10/24

考题 All client computers in your company run Windows 7 Enterprise. Users run Windows XP Mode guest virtual machines (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do? ()A、Set each VM network adapter to Not connected.B、Configure each VM to use one Internal Network network adapter.C、Configure each VM to use one Shared Networking (NAT) network adapter.D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic, and remove all other Windows Firewall exceptions.

考题 All client computers in your company run Windows 7 Enterprise.Users run Windows XP Mode guest virtual machi nes (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()A、Set each VM network adapter to Not connected.B、Configure each VM to use one Internal Network network adapter.C、Configure each VM to use one Shared Networking (NAT) networ k adapter.D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic,and remove all other Windows Firewall exceptions.

考题 You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()A、Use Network Monitor to capture traffic between Server1 and all client computers.B、Use Network Monitor to capture traffic between Server1 and Server2.C、Monitor Event Viewer for Net Logon error or warning events.D、Run the tracert command on Server1.

考题 Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()A、Install the application on a Remote Desktop Services server.B、Install a shim for the application on each client computer.C、Install the Windows Compatibility Evaluator on each client computer.D、Virtualize the application by using Microsoft Application Virtualization (App-V).

考题 Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A、Publish the application as a RemoteApp.B、Publish the application by using Remote Desktop Web Access (RD Web Access).C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D、Assign the application to all client computers by using a Group Policy object (GPO).

考题 单选题Which of the following is the purpose of QoS?()A Load balance traffic across multiple LAN and WAN links.B Increase speed of network traffic.C Classify, mark, and prioritize traffic on WAN and LAN linksD Guarantee traffic delivery.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 多选题Which three practices are important to the implementation of a DiffServ QoS architecture?()ABecause services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.BTraffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.CTraffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.DTraffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.EBased upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.FQoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

考题 单选题You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()A Use Network Monitor to capture traffic between Server1 and all client computers.B Use Network Monitor to capture traffic between Server1 and Server2.C Monitor Event Viewer for Net Logon error or warning events.D Run the tracert command on Server1.

考题 单选题Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C Use class-based policing to limit the peer-to-peer traffic rate.D Use class-based shaping to delay any excessive peer-to-peer traffic.

考题 单选题All client computers in your company run Windows 7 Enterprise.Users run Windows XP Mode guest virtual machi nes (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()A Set each VM network adapter to Not connected.B Configure each VM to use one Internal Network network adapter.C Configure each VM to use one Shared Networking (NAT) networ k adapter.D Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic,and remove all other Windows Firewall exceptions.

考题 单选题You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic. If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()A DSCP AF21B DSCP CS4C DSCP AF33D DSCP AF13

考题 单选题Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()A Install the application on a Remote Desktop Services server.B Install a shim for the application on each client computer.C Install the Windows Compatibility Evaluator on each client computer.D Virtualize the application by using Microsoft Application Virtualization (App-V).

考题 单选题All client computers in your company run Windows 7 Enterprise. Users run Windows XP Mode guest virtual machines (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()A Set each VM network adapter to Not connected.B Configure each VM to use one Internal Network network adapter.C Configure each VM to use one Shared Networking (NAT) network adapter.D Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic, and remove all other Windows Firewall exceptions.