网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
A

Traffic that does not match any route in the forwarding table.

B

Traffic that exceeds the bandwidth of the interface.

C

Traffic of unsupported protocols on that interface.

D

Traffic arriving on unknown virtual-circuits on that interface.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A Traffic that does not match any route in the forwarding table.B Traffic that exceeds the bandwidth of the interface.C Traffic of unsupported protocols on that interface.D Traffic arriving on unknown virtual-circuits on that interface.” 相关考题
考题 Which two conditions will cause switch-to-wire to occur? ()(Choose two.) A. loss of powerB. QoS congestionC. software failure occuredD. WX device exceeded its license speedE. traffic does not match application definiton

考题 In JUNOS software, which command is used to configure TED support for OSPF?() A. set protocols rsvp cspf-enableB. set protocols mpls cspf-enableC. set protocols rsvp traffic-engineeringD. set protocols ospf traffic-engineering

考题 Which statement describes transit traffic?() A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C. Any traffic that requires the generation of an ICMP message.D. Traffic that requires some form of special attention and does not pass through the device.

考题 Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?() A.Traffic that does not match any route in the forwarding table.B.Traffic that exceeds the bandwidth of the interface.C.Traffic of unsupported protocols on that interface.D.Traffic arriving on unknown virtual-circuits on that interface.

考题 Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which three statements about bidirectional PIM are true?()A、Traffic for a bidirectional group flows along the one shared tree and simultaneously utilizes multiple paths in a redundant network topologyB、It does not require any traffic signaling in the protocolC、Membership to a bidirectional group is signaled using explicit Join messagesD、It maintains source-specific forwarding stateE、It reduces memory, bandwidth, and CPU requirements

考题 When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()A、 Voice traffic will be assigned 47% of the interface bandwidth.B、 Voice call signaling will be assigned 33% of the interface bandwidth.C、 Telnet, SSH, and other traffic that is generated to manage the router is assigned 5% of the interface bandwidth.D、 Best-effort traffic will be assigned 38% of the interface bandwidth.E、 Routing protocol traffic will be assigned 5% of the interface bandwidth.F、 Transactional traffic will be assigned 5% of the interface bandwidth.

考题 Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

考题 Which two statements about WRED are true? ()A、WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.B、Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.C、WRED will throttle back voice traffic only as a last resort.D、If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.E、WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.F、 WRED treats non-IP traffic as precedence 4.

考题 What does the interface subcommand switchport voice vlan 222 indicate?()A、The port is configured for both data and voice traffic.B、The port is fully dedicated to forwarding voice traffic.C、The port will operate as an FXS telephony port.D、Voice traffic will be redirected to VLAN 222.

考题 Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }A、DNS traffic is denied.B、HTTP traffic is denied.C、FTP traffic is permitted.D、SMTP traffic is permitted.

考题 Which statement describes transit traffic?()A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C、Any traffic that requires the generation of an ICMP message.D、Traffic that requires some form of special attention and does not pass through the device.

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

考题 What are the steps for configuring stateful NBAR for dynamic protocols?()A、Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.B、Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.C、Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.D、Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.E、Configure video streaming. Configure audio streaming. Attach the codec to an interface.

考题 In JUNOS software, which command is used to configure TED support for OSPF?()A、set protocols rsvp cspf-enableB、set protocols mpls cspf-enableC、set protocols rsvp traffic-engineeringD、set protocols ospf traffic-engineering

考题 Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

考题 Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A、Traffic that does not match any route in the forwarding table.B、Traffic that exceeds the bandwidth of the interface.C、Traffic of unsupported protocols on that interface.D、Traffic arriving on unknown virtual-circuits on that interface.

考题 单选题Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A DNS traffic is denied.B Telnet traffic is denied.C SMTP traffic is denied.D Ping traffic is permitted

考题 多选题When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()AVoice traffic will be assigned 47% of the interface bandwidth.BVoice call signaling will be assigned 33% of the interface bandwidth.CTelnet, SSH, and other traffic that is generated to manage the router is assigned 5% of the interface bandwidth.DBest-effort traffic will be assigned 38% of the interface bandwidth.ERouting protocol traffic will be assigned 5% of the interface bandwidth.FTransactional traffic will be assigned 5% of the interface bandwidth.

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 单选题What does the interface subcommand switchport voice vlan 222 indicate?()A The port is configured for both data and voice traffic.B The port is fully dedicated to forwarding voice traffic.C The port will operate as an FXS telephony port.D Voice traffic will be redirected to VLAN 222.

考题 单选题What are the steps for configuring stateful NBAR for dynamic protocols? ()A use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceB use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbersC use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceD configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. E configure video streaming. Configure audio streaming. Attach the codec to an interface

考题 单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed

考题 单选题What are the steps for configuring stateful NBAR for dynamic protocols?()A Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.B Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.C Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.D Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.E Configure video streaming. Configure audio streaming. Attach the codec to an interface.

考题 单选题In JUNOS software, which command is used to configure TED support for OSPF?()A set protocols rsvp cspf-enableB set protocols mpls cspf-enableC set protocols rsvp traffic-engineeringD set protocols ospf traffic-engineering

考题 单选题Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A Traffic that does not match any route in the forwarding table.B Traffic that exceeds the bandwidth of the interface.C Traffic of unsupported protocols on that interface.D Traffic arriving on unknown virtual-circuits on that interface.