单项选择题What are the steps for configuring stateful NBAR for dynamic protocols? ()

A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. 
E.configure video streaming. Configure audio streaming. Attach the codec to an interface


您可能感兴趣的试卷

你可能感兴趣的试题

2.多项选择题Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true ?()

A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template

3.多项选择题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()

A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ

4.多项选择题Which two statements best describe enhanced wireless security encryption?()

A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption

5.多项选择题What are three facts control plane policing? ()

A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane

6.多项选择题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

7.多项选择题What are two components of the Cisco Lightweight WLAN solution?()

A.WCS
B.WLSE
C.Location Appliance
D.WDS
E.WLSE-Express

8.多项选择题What are two steps to define a QoS policy?()

A.set a minimum bandwidth guarantee
B.increase bandwidth
C.determine a specific transfer rate
D.establish timers
E.configure CBWFQ for best-effort traffic
F.set a maximum bandwidth limit

9.多项选择题What are three of the functions that AutoQoS performs when it is configured on a switch?()

A.synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B.enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C.enables low latency queuing to ensure that voice traffic receives priority treatment
D.enforces a trust boundary on switch access ports and uplinks/downlinks 
E.modifies queue sizes as well as queue weights where required 
F.adjusts link speeds to adapt to QoS needs

10.单项选择题Which Cisco IOS traffic-shaping mechanism statement is true? ()

A.class-based policing is configured using the Modular QoS command-line (MQC)
B.only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN links
C.Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configuration
D.both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic

最新试题

What are the three models of quality of service (QoS) in a network?()

题型:多项选择题

End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()

题型:单项选择题

SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()

题型:多项选择题

Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()

题型:多项选择题

Which three practices are important to the implementation of a DiffServ QoS architecture?()

题型:多项选择题

What are three Cisco Unified CallManager features? ()

题型:多项选择题

When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()

题型:单项选择题

Which Control Plane Policing (CoPP) statement is true?()

题型:单项选择题

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

题型:单项选择题

Which two QoS classification and marking statements are true? ()

题型:多项选择题