單項(xiàng)選擇題The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()

A. nGenius Real-Time Monitor
B. CiscoView
C. Device Fault Manager
D. Internetwork Performance Monitor


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for call admission control within existing H.323 environments?()

A. single site with centralized call processing
B. single site with distributed call processing
C. multisite with centralized call processing
D. multisite with distributed call processing

3.多項(xiàng)選擇題Which two settings must be configured in order to use the GUI to configure Call Admission Control with voice applications?()

A. QoS must be set to Platinum
B. WMM must be enabled
C. QoS must be set to Gold
D. TSPEC must be disabled
E. Cisco Compatible Extensions must be disabled

4.多項(xiàng)選擇題When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()

A. rate limit voice traffic
B. configure spanning-tree for fast link convergence
C. isolate voice traffic on separate VLANs
D. classify and mark traffic close to the source

5.問答題

DRAG DROP

6.多項(xiàng)選擇題What are disadvantages to storage directly attached to the application servers?()

A. reliability
B. scalability
C. redundancy
D. manageability

7.單項(xiàng)選擇題Which statement about IDS/IPS design is correct?()

A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

8.單項(xiàng)選擇題Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.

最新試題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項(xiàng)選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項(xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:單項(xiàng)選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項(xiàng)選擇題

Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

題型:單項(xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項(xiàng)選擇題