网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

monitor traffic命令能够检测到的traffic()

  • A、入接口at-0/2/0.100,目的到路由引擎
  • B、从路由引擎到出接口at-0/2/0.100
  • C、入接口at-0/2/0.100,目的接口so-2/0/0.0
  • D、从so-2/0/0.0接口到出接口at-0/2/0.100

参考答案

更多 “monitor traffic命令能够检测到的traffic()A、入接口at-0/2/0.100,目的到路由引擎B、从路由引擎到出接口at-0/2/0.100C、入接口at-0/2/0.100,目的接口so-2/0/0.0D、从so-2/0/0.0接口到出接口at-0/2/0.100” 相关考题
考题 When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

考题 Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

考题 The monitor traffic command provides access to which utility?() A.tcpdumpB.telnetC.tracerouteD.netstat

考题 The monitor traffic command closely resembles which UNIX-based utility?() A.ps -xB.passwdC.ls -a-lD.tcpdump

考题 Which CLI command displays packet and byte counts for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts

考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

考题 Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

考题 Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

考题 Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

考题 EIGRP中traffic-share balanced命令是什么意思?

考题 下列PM计数命令()是错误的。A、#ONT/traffic/voipshow pm rtpB、#ONT/traffic/voipshow pm callcontrolC、#ONT/traffic/ponshow pm gem allD、#ONT/traffic/ethshow pm igmp

考题 H248语音Debug涉及到()命令。A、#ONT/traffic/voipdebug enableB、#ONT/traffic/voipdrv debug enableC、#ONT/traffic/voipdump h248 enableD、#ONT/traffic/voipdump sip show

考题 基于类的QoS的命令行的三大部分是()。A、流分类(traffic classifier)B、流动作(traffic behavior)C、流量策略(traffic policy)D、流量整形和监管

考题 Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

考题 Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

考题 Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 多选题Which two of these are characteristics of an IDS sensor?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IDS interface and exits on anotherEhas a promiscuous interface that is used to monitor the network

考题 多选题Which of the following are benefits provided with access control lists (ACLs)?()AACLs monitor the number of bytes and packets.BVirus detection.CACLs dentify interesting traffic for DDR.DACLs provide IP route filtering.EACLs provide high network availability.FACLs classify and organize network traffic.

考题 单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A snoopB tcpdumpC monitorD tail

考题 单选题The monitor traffic command provides access to which utility?()A tcpdumpB telnetC tracerouteD netstat

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 多选题基于类的QoS的命令行的三大部分是()。A流分类(traffic classifier)B流动作(traffic behavior)C流量策略(traffic policy)D流量整形和监管

考题 单选题Which of the following is the BEST reason to implement a firewall on a server?()A To watch for bandwidth issuesB To protect the server from all trafficC To block certain traffic by portsD To monitor certain malicious traffic