题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-23 04:33:43

[多项选择]What are two purposes of the RSVP signaling protocol when configuring MPLS Label-Switched Paths (LSPs)? ()(Choose two.)
A. to perform a label push operation
B. to track the status of signaled LSPs
C. to perform longest-match route lookups
D. to reserve resources, such as labels and path information

更多"What are two purposes of the RSVP s"的相关试题:

[多项选择]What are two characteristics of Telnet (Choose two.)()。
A. Itsendsdataincleartextformat.
B. ItisnolongersupportedonCisconetworkdevices.
C. ItismoresecurethanSSH
D. Itrequiresanenterpriselicenseinordertobeimplemented.
E. ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
[多项选择]Which two characteristitcs describe the UDP protocol?()
A. limited error checking
B. defined timers
C. no recovery mechanisms
D. three-way handshake
[多项选择]What are two Junos processes?()
A. OSPF SPF daemon (ospfd)
B. SNMP daemon (snmpd)
C. BGP daemon (bgpd)
D. Routing protocols daemon (rdp)
[多项选择]What are two characteristics of the relationship between the Cisco PIN architecture and CiscoValidated Designs? ()(Choose two.)
A. Cisco is focusing on Cisco Validated Designs as a means to driving integrated networks.
B. Cisco is focusing on the PIN architecture as a means to driving integrated networks.
C. The Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.
D. The Cisco Validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.
E. Cisco Validated Designs can be implemented quickly without customer input.
[多项选择]What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation
[多项选择]What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
[多项选择]What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)
A. All "Add" channels require uniform power levels.
B. The flexibility of wavelengths per OADM is limited.
C. It is easier to balance "Pass-Through" and "Add" channels.
D. There is lower pass-through loss using multi-channel OADMs.
E. You can extract a single channel without dropping other channels.
[多项选择]What are two types of WebView monitoring statistics on the WX/WXC platforms?() (Choose two.)
A. LAN
B. QoS
C. traffic
D. IPSec
[多项选择]Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
A. protocol list
B. MIME
C. block list
D. extension
[多项选择]What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth.
B. It profiles based on loss priority.
C. It prevents traffic loss through buffering.
D. It prevents global synchronization with tail drops.
[多项选择]What are two considerations to using IP Multicast delivery?()
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
[多项选择]What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A. Allow unrestricted access to the console or VTY ports
B. Use a firewall to restrict access from the outside to the network devices
C. Always use Telnet to access the device command line because its data is automatically encrypted
D. Use SSH or another encrypted and authenticated transport to access device configurations
E. Prevent the loss of passwords by disabling password encryption
[多项选择]What are two reasons that a network administrator would use access lists (Choose two.)()。
A. to control vty access into a router
B. to control broadcast traffic through a router
C. to filter traffic as it passes through a router
D. to filter traffic that originates from the router
E. to replace passwords as a line of defense against security incursions
[多项选择]What are two routing requirements for a device to communicate with another device?()
A. end-to-end communications path
B. hosts on the same Layer 2 broadcast domain
C. hosts on the same Layer 3 broadcast domain
D. routing information on participating Layer 3 devices
[多项选择]What are two benefits of MLPPP?()
A. Cost-efficient solution when incrementing bandwidth.
B. Provides for fail over when the primary link goes down.
C. Evenly distributes traffic over participating member links.
D. Guarantees that the link will remain up during failure scenarios.
[多项选择]What are two requirements when using Packet Flow Acceleration? ()(Choose two.)
A. Traffic needs be compressed.
B. Quality of service must be enabled.
C. A service tunnel must exist in at least one direction.
D. PFA must be enabled on the client-side WX device.
[多项选择]What are two requirements to perform a warm Cisco IOS upgrade on a Cisco ISR router? ()(Choose two.)
A. at least one enabled Ethernet interface
B. Cisco IOS version 12.3(2)T or greater
C. enough memory to decompress the new Cisco IOS image
D. internal flash memory equaling two times the space required for the current Cisco IOS image
[多项选择]What are two ways that packet fragmentation is handled differently between IPv6 and IPv4?()
A. End hosts determine the path MTU for IPv6.
B. End hosts determine the path MTU for IPv4.
C. Packet fragmentation occurs at intermediate nodes for IPv4.
D. Packet fragmentation occurs at intermediate nodes for IPv6.
[多项选择]What are two features of Packet Flow Acceleration?() (Choose two.)
A. Policy-Based Multipath
B. TCP Acceleration (AFP)
C. Forward Error Correction
D. Molecular Sequence Reduction

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码