Rewrite rules are used in which CoS scenario?()A、When a single device is configured to provide differentiated services.B、When multiple devices in a network are configured to use CoS to provide differentiated services.C、When a device is used to connect to

题目

Rewrite rules are used in which CoS scenario?()

  • A、When a single device is configured to provide differentiated services.
  • B、When multiple devices in a network are configured to use CoS to provide differentiated services.
  • C、When a device is used to connect to another autonomous system.
  • D、When CoS is used to classifiy traffic as low priority.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What is the first CoS process performed when a packet enters a JUNOS device?()

A.Rewrite Marker

B.Multifield Classifier

C.Policing

D.BA Classifier


参考答案:D

第2题:

You have configured voice VLANs on Catalyst switch R1.  Which two statements are true about the  operation of voice VLANs on this device? ()

  • A、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port.
  • B、 Enabling voice VLANs enables the switch to create multiple queues for traffic that is entering a  port.
  • C、 When voice VLANs are configured on a trunk link, UplinkFast must also be enabled.
  • D、 Voice VLANs are configured to enable the switch to forward frames marked with the proper  CoS values over separate physical links.
  • E、 Enabling voice VLANs enables the switch to forward frames with a specific 802.1P marking.

正确答案:A,E

第3题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第4题:

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()

  • A、Switch
  • B、Hub
  • C、Modem
  • D、Repeater

正确答案:B

第5题:

Which two statements are true about voice VLANs?()

  • A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
  • B、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
  • C、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
  • D、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
  • E、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
  • F、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

正确答案:C,D

第6题:

You have just configured a static default route on router TK1. What is the purpose of a default route?()

A. It is a route to be used when the routing protocol fails.

B. It is a route configured by an ISP that sends traffic into a corporate network.

C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.

D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.

E. It is used to send traffic to a stub network.


参考答案:C

第7题:

Which statement best describes the benefits of Cisco Integrated Services Routers?()

  • A、 In a single device,ISRs provide threat defense against attacks from hackers and viruses thatcan occur in the network.
  • B、 In a single device,ISRs provide the framework to integrate and extend wired and wirelessnetworks.
  • C、 In a single device ISRs provide concurrent security, voice, data, wireless and applicationoptimization services.
  • D、 In a single device,ISRs provide the common fabric,functionality,and CLI across the network.

正确答案:C

第8题:

Rewrite rules are used in which CoS scenario?()

A.When a single device is configured to provide differentiated services.

B.When multiple devices in a network are configured to use CoS to provide differentiated services.

C.When a device is used to connect to another autonomous system.

D.When CoS is used to classifiy traffic as low priority.


参考答案:B

第9题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第10题:

While adding the forced varyon volume group option, it is decided to create a disk heartbeat  Network over the disk paths. Which HACMP function is used to create disk heartbeat devices?()

  • A、 The Disk hearbeat facility is initialized when creating enhanced concurrent mode volume groups through HACMP.
  • B、 HACMP does not create the disk heartbeat area directly; RSCT facility creates the area used for the disk heartbeat when the device is started by Group Services.
  • C、 The ’Chdev -v-C " command creates an enhanced Volume Group from an ordinarilyVolume Group. This creates the heartbeat region on the vfirst disk in the chain.
  • D、 The disk heartbeat area on the disk is created and initialized when the device is created inHACMP "Extended Configuration -> Extended Topology -> Disk heartbeat facility" smit path.

正确答案:A

更多相关问题