单选题Rewrite rules are used in which CoS scenario?()A When a single device is configured to provide differentiated services.B When multiple devices in a network are configured to use CoS to provide differentiated services.C When a device is used to connect

题目
单选题
Rewrite rules are used in which CoS scenario?()
A

When a single device is configured to provide differentiated services.

B

When multiple devices in a network are configured to use CoS to provide differentiated services.

C

When a device is used to connect to another autonomous system.

D

When CoS is used to classifiy traffic as low priority.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What is the first CoS process performed when a packet enters a JUNOS device?()

A.Rewrite Marker

B.Multifield Classifier

C.Policing

D.BA Classifier


参考答案:D

第2题:

You have configured voice VLANs on Catalyst switch R1.  Which two statements are true about the  operation of voice VLANs on this device? ()

  • A、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port.
  • B、 Enabling voice VLANs enables the switch to create multiple queues for traffic that is entering a  port.
  • C、 When voice VLANs are configured on a trunk link, UplinkFast must also be enabled.
  • D、 Voice VLANs are configured to enable the switch to forward frames marked with the proper  CoS values over separate physical links.
  • E、 Enabling voice VLANs enables the switch to forward frames with a specific 802.1P marking.

正确答案:A,E

第3题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第4题:

While adding the forced varyon volume group option, it is decided to create a disk heartbeat  Network over the disk paths. Which HACMP function is used to create disk heartbeat devices?()

  • A、 The Disk hearbeat facility is initialized when creating enhanced concurrent mode volume groups through HACMP.
  • B、 HACMP does not create the disk heartbeat area directly; RSCT facility creates the area used for the disk heartbeat when the device is started by Group Services.
  • C、 The ’Chdev -v-C " command creates an enhanced Volume Group from an ordinarilyVolume Group. This creates the heartbeat region on the vfirst disk in the chain.
  • D、 The disk heartbeat area on the disk is created and initialized when the device is created inHACMP "Extended Configuration -> Extended Topology -> Disk heartbeat facility" smit path.

正确答案:A

第5题:

Which two statements are true about voice VLANs?()

  • A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
  • B、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
  • C、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
  • D、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
  • E、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
  • F、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

正确答案:C,D

第6题:

You have just configured a static default route on router TK1. What is the purpose of a default route?()

A. It is a route to be used when the routing protocol fails.

B. It is a route configured by an ISP that sends traffic into a corporate network.

C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.

D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.

E. It is used to send traffic to a stub network.


参考答案:C

第7题:

Which statement best describes the benefits of Cisco Integrated Services Routers?()

  • A、 In a single device,ISRs provide threat defense against attacks from hackers and viruses thatcan occur in the network.
  • B、 In a single device,ISRs provide the framework to integrate and extend wired and wirelessnetworks.
  • C、 In a single device ISRs provide concurrent security, voice, data, wireless and applicationoptimization services.
  • D、 In a single device,ISRs provide the common fabric,functionality,and CLI across the network.

正确答案:C

第8题:

Rewrite rules are used in which CoS scenario?()

A.When a single device is configured to provide differentiated services.

B.When multiple devices in a network are configured to use CoS to provide differentiated services.

C.When a device is used to connect to another autonomous system.

D.When CoS is used to classifiy traffic as low priority.


参考答案:B

第9题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第10题:

A client has an existing p5 570 that is directly connected to a HMC. The customer will be purchasing another p5 570. Which of the following solutions would be appropriate to provide HMC connectivity to the second p5 570?()

  • A、Implement a proxy server to provide multiple sources to one destination 
  • B、Purchase an additional Ethernet adapter for each p5 570 to provide connectivity between the two 
  • C、Purchase a network hub or switch so both p5 570s can connect to the single HMC 
  • D、Purchase an additional HMC since multiple HMC are required when more than one POWER5 Enterprise class server is used Purchase an additional HMC since multiple HMC? are required when more than one POWER5 Enterprise class server is used

正确答案:C

更多相关问题