A.The processing time on the end routers is only assessed for operations that involve the responder.
B.The processing time on the end routers is only assessed for operations that involve the transmitter.
C.The processing time on the end routers is only assessed for operations that involve both the responder and the transmitter.
D.The processing time on the end routers is not assessed for neither the responder nor the transmitter.
您可能感興趣的試卷
你可能感興趣的試題
A.ICMP path echo
B.UDP echo
C.ICMP path jitter
D.Application Performance Monitor
E.TCP connect
Refer to the exhibit. You have noticed that several users in the network are consuming a great deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is still heavily oversubscribing the interface. What is the cause of this problem?()
A.CEF needs to be enabled for NBAR
B.In class Kazaa2, you should configure a policer instead of a drop command.
C.The server class should have a priority of 100.
D.The bandwidth parameter on serial 0/0 is wrong.
E.Kazaa2 is not a valid protocol.
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue,the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, anunauthorized switch 2 was found.This unauthorized switch has been a regular problem, assuming the root bridge function under thespanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actionscould be suggested to fix the problem?()
A.Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B.Change Business VLAN PCs to switch 1 and switch 4.
C.Force the root bridge to be switch 2, instead.
D.Adjust spanning-tree timers (max-age and forward-delay).
E.Shut down all unused ports.
F.Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN.
Refer to the exhibit. As a network administrator, you have configured a dual-rate, dual-bucket policer in accordance with RFC 2698 on the serial interface of you router, connecting to your provider. The SLA with your provider states that you should only send AF31 (limited to 150 kb/s), AF32 (limited to 50 kb/s)and AF33 (best effort). Your service provider claims you are not conforming to the SLA.Which two things are wrong with this configuration? ()
A.The configuration of a service policy on half-duplex Ethernet interfaces is not supported.
B.The class class-default sub-command of the policy-map limit command should be set to the DSCP default.
C.The violate action is wrong.
D.This policer configuration is not implementing RFC 2698 dual-bucket, dual-rate.
E.The policer is configured in the wrong class.
最新試題
問(wèn)一個(gè)怎么樣的屬性,能讓路由不通告給任何的peer?
Which of the following are key characteristics of PPP?()
what is the advantage of policing opposite to shaping?
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
What field in IP packet is used for classification by QOS?
When upgrading the IOS image,the network administrator receives the exhibited error message.What could be the cause of this error?()
如何實(shí)現(xiàn)擁塞避免?
R1 will choose which path to reach 10.1.0.0?
什么問(wèn)題導(dǎo)致SERVER VTP密碼跟替他交換機(jī)VTP密碼不匹配?
當(dāng)將多個(gè)交換機(jī)加入到MST region當(dāng)中會(huì)發(fā)生什么(what happen)?