A.The processing time on the end routers is only assessed for operations that involve the responder.
B.The processing time on the end routers is only assessed for operations that involve the transmitter.
C.The processing time on the end routers is only assessed for operations that involve both the responder and the transmitter.
D.The processing time on the end routers is not assessed for neither the responder nor the transmitter.
您可能感興趣的試卷
你可能感興趣的試題
A.ICMP path echo
B.UDP echo
C.ICMP path jitter
D.Application Performance Monitor
E.TCP connect
Refer to the exhibit. You have noticed that several users in the network are consuming a great deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is still heavily oversubscribing the interface. What is the cause of this problem?()
A.CEF needs to be enabled for NBAR
B.In class Kazaa2, you should configure a policer instead of a drop command.
C.The server class should have a priority of 100.
D.The bandwidth parameter on serial 0/0 is wrong.
E.Kazaa2 is not a valid protocol.
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue,the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, anunauthorized switch 2 was found.This unauthorized switch has been a regular problem, assuming the root bridge function under thespanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actionscould be suggested to fix the problem?()
A.Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B.Change Business VLAN PCs to switch 1 and switch 4.
C.Force the root bridge to be switch 2, instead.
D.Adjust spanning-tree timers (max-age and forward-delay).
E.Shut down all unused ports.
F.Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanning-tree convergence time within each VLAN.
Refer to the exhibit. As a network administrator, you have configured a dual-rate, dual-bucket policer in accordance with RFC 2698 on the serial interface of you router, connecting to your provider. The SLA with your provider states that you should only send AF31 (limited to 150 kb/s), AF32 (limited to 50 kb/s)and AF33 (best effort). Your service provider claims you are not conforming to the SLA.Which two things are wrong with this configuration? ()
A.The configuration of a service policy on half-duplex Ethernet interfaces is not supported.
B.The class class-default sub-command of the policy-map limit command should be set to the DSCP default.
C.The violate action is wrong.
D.This policer configuration is not implementing RFC 2698 dual-bucket, dual-rate.
E.The policer is configured in the wrong class.
最新試題
什么是NAT?
How should arouter that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()
Refer to the exhibit.How many broadcast domains exist in theexhibited topology?()
When upgrading the IOS image,the network administrator receives the exhibited error message.What could be the cause of this error?()
Refer to the exhibit.The network administrator is in acampus building distant from Building B.WANRouter is hosting a newly installed WAN link on interface S0/0.The new link is not functioning and the administrator needs to determine if the correct cable has been attached to the S0/0 interface.How can the administrator accurately verify the correct cable type on S0/0 in the most efficient manner?()
What is the three main step of using the QoS feature with MQC command line interface?
What field in IP packet is used for classification by QOS?
Refer to the exhibit.Which statement describes DLCI 17?()
Which of the following are key characteristics of PPP?()
As a CCNA candidate,you must have a firm understanding of the IPv6 address structure.Refer to IPv6 address,could you tell me how many bits are included in each filed?()