A.ICMP path echo
B.UDP echo
C.ICMP path jitter
D.Application Performance Monitor
E.TCP connect
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. You have noticed that several users in the network are consuming a great deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is still heavily oversubscribing the interface. What is the cause of this problem?()
A.CEF needs to be enabled for NBAR
B.In class Kazaa2, you should configure a policer instead of a drop command.
C.The server class should have a priority of 100.
D.The bandwidth parameter on serial 0/0 is wrong.
E.Kazaa2 is not a valid protocol.
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue,the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, anunauthorized switch 2 was found.This unauthorized switch has been a regular problem, assuming the root bridge function under thespanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actionscould be suggested to fix the problem?()
A.Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B.Change Business VLAN PCs to switch 1 and switch 4.
C.Force the root bridge to be switch 2, instead.
D.Adjust spanning-tree timers (max-age and forward-delay).
E.Shut down all unused ports.
F.Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN.
Refer to the exhibit. As a network administrator, you have configured a dual-rate, dual-bucket policer in accordance with RFC 2698 on the serial interface of you router, connecting to your provider. The SLA with your provider states that you should only send AF31 (limited to 150 kb/s), AF32 (limited to 50 kb/s)and AF33 (best effort). Your service provider claims you are not conforming to the SLA.Which two things are wrong with this configuration? ()
A.The configuration of a service policy on half-duplex Ethernet interfaces is not supported.
B.The class class-default sub-command of the policy-map limit command should be set to the DSCP default.
C.The violate action is wrong.
D.This policer configuration is not implementing RFC 2698 dual-bucket, dual-rate.
E.The policer is configured in the wrong class.
Refer to exhibits 1 and 2. A company uses a Metro Ethernet (Gigabit Ethernet) dedicated circuit to communicate between users (subnet B) and servers (subnet A) as shown in Exhibit 1. Both routers use OSPF to advertise the subnets. During a weekly management meeting, they realize that the WAN link is oversize. They have been using only 2 Mb/s in the worst-case scenario. So they propose a new, cheaper WAN connection using a 2-Mb/s Frame-Relay point-to-point link to interconnect both sites (Exhibit 2). The Frame Relay service provider informs them that multicast traffic is not allowed to run over the service provider network. Which one of these options is best to enable the company to establish the OSPF neighbor adjacency?()
A.Use OSPF network broadcast,because it uses unicast to establish a neighbor relationship.
B.Use OSPF network point-to-multipoint,because it uses unicast to establish a neighbor relationship.
C.Use OSPF network point-to-point,because it uses unicast to establish a neighbor relationship.
D.Use OSPF network point-to-multipoint nonbroadcast,because it establishes a neighbor relationship using unicast packets.
E.Use OSPF network nonbroadcast,because it establishes a neighbor relationship using multicast.
哪個設(shè)備會被選為根橋?
Refer to the exhibit. When applying this policy map on the tunnel1 interface, you see packet loss for the TCP class starting at around 100000 b/s, instead of the configured 150000 b/s. What is the most likely cause of the discrepancy?()
A.The violate-action command should not be configured.
B.The current configuration of the load-interval command on the tunnel interface is preventing proper policing calculations.
C.The burst size is too low.
D.Policing on tunnel interfaces is not supported.
E.The CIR keyword is missing in the policer.
Refer to exhibits 1 and 2. In exhibit 1,all users on the LAN segment use router A as the active HSRP router. Router B is the standby router for the HSRP. In exhibit 2,the network management team reported that there is no utilization on the WAN link B. To solve this problem,you decide to change the logical topology of your LAN,but you are not sure about what changes must be made. You must manage HSRP or change it to another protocol in order to provide the most scalable design,automatic redundancy,and load balancing. Which one of these actions would be the best choice?()
A.Use MHSRP,with three users using router A as the default gateway and three users using router B as the default gateway.
B.Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C.Use the backup interface on the WAN link B to provide load balancing for all users.
D.Use GLBP instead,because it provides you with up to three MAC addresses for the same default gateway virtual IP address.
E.Use GLBP instead,because it provides you with up to four MAC addresses for the same default gateway virtual IP address.
最新試題
Refer to the exhibit.How many broadcast domains exist in theexhibited topology?()
Which of the following are key characteristics of PPP?()
When upgrading the IOS image,the network administrator receives the exhibited error message.What could be the cause of this error?()
what is the disadvantage of policing?
Refer to the exhibit.What is the meaning of the term dynamic as displayed in the output of the show frame-relay map command shown?()
What is method list for configure aaa?
The Frame Relay network in the diagram is not functioning properly.What is the cause of the problem?()
As a CCNA candidate,you must have a firm understanding of the IPv6 address structure.Refer to IPv6 address,could you tell me how many bits are included in each filed?()
如何實現(xiàn)擁塞避免?
什么問題導(dǎo)致SERVER VTP密碼跟替他交換機VTP密碼不匹配?