网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
A
Traffic that does not match any route in the forwarding table.
B
Traffic that exceeds the bandwidth of the interface.
C
Traffic of unsupported protocols on that interface.
D
Traffic arriving on unknown virtual-circuits on that interface.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A Traffic that does not match any route in the forwarding table.B Traffic that exceeds the bandwidth of the interface.C Traffic of unsupported protocols on that interface.D Traffic arriving on unknown virtual-circuits on that interface.” 相关考题
考题
Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
A. The traffic will be rejected.B. The traffic will be dropped.C. The traffic will be forwarded.D. The traffic will be policed.
考题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.
考题
Which extension to the OSPFv2 protocol supports traffic engineering?()
A. LSA Type 8B. LSA Type 9C. LSA Type 10D. Transparent LSA
考题
Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()
A. oplockB. block lockC. bit range lockD. byte range lock
考题
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
A.Traffic that does not match any route in the forwarding table.B.Traffic that exceeds the bandwidth of the interface.C.Traffic of unsupported protocols on that interface.D.Traffic arriving on unknown virtual-circuits on that interface.
考题
When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?()
A.alogB.telinitC.sysinitD.cfgmgr
考题
Which OSPF LSA is used to support MPLS traffic engineering?()A、opaque LSA (Type 8)B、opaque LSA (Type 9)C、link LSA (Type 1)D、network LSA (Type 2)E、opaque LSA (Type 10)
考题
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
考题
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard
考题
Which Control Plane Policing (CoPP) statement is true?()A、 Traffic to be policed is identified using the control-plane global configuration command.B、 The control-plane global configuration command enters the Cisco Modular QoS CLI (MQC) mode.C、 The control-plane global configuration command enters the control-plane configuration mode. D、 Traffic to be policed is identified using the control-plane interface configuration command.E、 The control-plane interface configuration command enters the Cisco Modular QoS CLI (MQC) mode.F、 The control-plane interface configuration command enters the control-plane configuration mode.
考题
Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.
考题
Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic
考题
When troubleshooting hardware issues with a server, which of the following is MOST likely to cause a problem in receiving vendor support?()A、 Third party cablesB、 Third party memoryC、 Signed driversD、 Server type
考题
When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?()A、alogB、telinitC、sysinitD、cfgmgr
考题
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A、Traffic that does not match any route in the forwarding table.B、Traffic that exceeds the bandwidth of the interface.C、Traffic of unsupported protocols on that interface.D、Traffic arriving on unknown virtual-circuits on that interface.
考题
单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A
Inadequate RAMB
Slow processorC
PCI busD
Excessive network traffic
考题
单选题Which OSPF LSA is used to support MPLS traffic engineering?()A
opaque LSA (Type 8)B
opaque LSA (Type 9)C
link LSA (Type 1)D
network LSA (Type 2)E
opaque LSA (Type 10)
考题
单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A
It enables an attacker to perform an IP sweep of devices.B
It enables a hacker to know which operating system the system is running.C
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D
It creates a ping of death and can cause the entire network to be infected with a virus.
考题
单选题Which type of zone is used by traffic transiting the device?()A
transit zoneB
default zoneC
security zoneD
functional zone
考题
单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A
The traffic will be rejectedB
The traffic will be droppedC
The traffic will be forwardedD
The traffic will be policed
考题
单选题Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()A
oplockB
block lockC
bit range lockD
byte range lock
考题
单选题Which extension to the OSPFv2 protocol supports traffic engineering?()A
LSA Type 8B
LSA Type 9C
LSA Type 10D
Transparent LSA
考题
多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard
考题
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
考题
单选题Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A
Traffic that does not match any route in the forwarding table.B
Traffic that exceeds the bandwidth of the interface.C
Traffic of unsupported protocols on that interface.D
Traffic arriving on unknown virtual-circuits on that interface.
考题
单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A
The traffic will be rejected.B
The traffic will be dropped.C
The traffic will be forwarded.D
The traffic will be policed.
热门标签
最新试卷