A. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
D. NetFlow can be configured to identify voice and video traffic flows and place them into a lowlatency queue for expedited processing.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Which of the following statements is true? ()
A. BGP NSF awareness is enabled
B. SSO for BGP NSF capability is enabled
C. BGP graceful restart awareness is enabled
D. 10.11.1.187 is configured as an NSF-capable BGP neighbor
A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
B. authenticates users and devices so that it is impossible for a rogue device to be connected to the network
C. allows you to centralize management, automate repetitive tasks, and provision IP services easily
D. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN
A. Form an impression about the network.
B. Prepare and add to the network description.
C. Use traffic analysis to augment organizational input.
D. Perform a network audit.
A. Verify that the SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Implement threshold monitoring using RMON.
A. Cisco Direct Attached Storage
B. Cisco Direct Storage Area Network
C. Cisco Virtual Storage Area Network
D. Cisco Virtual Attached Storage Network
A. Cisco Network Assistant
B. Cisco IPS
C. AES
D. Cisco VAM2+
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfol
E. strives to protect access to design documentation
A. to make CEF tables smaller
B. to enable label switching on the frame mode interface
C. to restrict MPLS availability to predefined time periods
D. to restrict label switching to a limited number of networks
E. to restrict end users from seeing the routers in the MPLS network
Refer to the exhibit. This shows the NetFlow statistics for a router. You are analyzing the traffic pattern and you are interested in the percentage of packets between 32 and 64 bytes in size and the number of flows in progress. Which of these identifies both numbers correctly?()
A. 69.4%, 4061
B. 24.9%, 980
C. 69.4%, 35
D. 6.94%, 980
E. cannot be determined from this output
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
最新試題
On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()
Which command is used to view IPv6 parameters related to the BGP process?()
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard.Which of the following will answer his question?()
What are four advantages to using tunnel brokers in an IPv6 transition environment?()
Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()
What is the function of the no switchport catalyst switch interface configuration command?()
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
Which keyword is used with the show ip bgp neighbors [keyword] command to display all routes that are received and accepted from a neighbor?()
Referring to the partial Cisco Catalyst switch configuration shown, which two of these statements are correct? ()(Choose two.)
Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()