题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-27 00:05:26

[单项选择]Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.

更多"Users at the Charleville Company be"的相关试题:

[单项选择]Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
[单项选择]Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()
A.  Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B.  Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. 
C.  Use class-based policing to limit the peer-to-peer traffic rate.
D.  Use class-based shaping to delay any excessive peer-to-peer traffic.
[单项选择] Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
A. Ashort
B. Open pairs
C. ESD
D. EMI
[单项选择] Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00.  What should you do( )? 
A. Create a network policy for VPN connections. modify the Day and time restrictions.
B. Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C. Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D. Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
[单项选择]Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()
A. Create a network policy for VPN connections. Modify the Day and time restrictions.
B. Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.
C. Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.
D. Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
[单项选择]The three disrespectful sons began to feel worried about the ultimate ______ of the family's property.
A. proposal
B. disposal
C. removal
D. salvation
[单项选择]In 1863 the United States government began providing which of the following to mail carriers
A. Housing.
B. A salary.
C. Transportation.
D. Free postage stamps.
[单项选择]Macdonald began his attack on plans for secret terror trials
[单项选择]The Renaissance began in northern Italy in the early()century,and was typified by the universal genius of Leonardo Da Vinci.
A. 11th
B. 12th
C. 13th
D. 14th
[单项选择]No sooner had we reached the office than it began to snow.
A. 我们还没到办公室,它就开始下雪。
B. 我们还没到办公室,天就开始下雪了。
C. 我们一到办公室,天就开始下雪了。
D. 我们一到办公室,它就下雪了。
[单项选择]Hardly()home when it began to rain.
A. had I got
B. I had got
C. had Iarrived in
[单项选择]Edgar began()as an office boy years ago.
A. job
B. work
C. position
D. occupation
[单项选择]The first European settlement on Australia began in ______.
A. 1901
B. 1788
C. 1770
D. 1787
[单项选择]The Vikings began to attack various parts of England from the end of the()century.
A. 7th
B. 8th
C. 9th
D. 10th
[单项选择]

 We have no idea about when men first began to use salt, but we do know that it has been used in many different ways throughout the history. For example, it is recorded in many history books the people who lived over three thousand years ago ate salted fish. Thousands of years ago in Egypt, salt was used to preserve the dead. In some periods of history, a person who stole salt was thought to have broken the law. Take the eighteenth century for an example, if a person was caught stealing salt, he would be thrown into prison. History also records that only in England about ten thousand people were put into prison during that century for stealing salt! About one hundred and fifty years ago, in the year 1553, if a man took more than his share of salt, he would be thought to have broken the law and would be seriously punished. The offender’ s ear was cut off. Salt was an important item on the dinner table of a king. It was always placed in front of the king when he sat down
A. they had been caught stealing salt
B. they had sold salted fish
C. they had taken salt from the king' s table
D. they had used salt to preserve dead bodies

[单项选择]Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
[单项选择]Before she began to study at Beijing University, she()in a factory for five years.
A. had worked
B. worked
C. has worked
D. would work
[单项选择] An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
A. Secure VPN
B. MAC filtering
C. IP filtering
D. Static IP addresses
[单项选择]The journalists and camera crews began to ______ in the heat as they stood waiting for the president to appear.
A. conspire
B. transpire
C. perspire
D. inspire

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码