niusouti.com

Which three applications are disabled for compression by default?() (Choose three.)A、FTPB、SSHC、UDPD、HTTPSE、Traceroute

题目

Which three applications are disabled for compression by default?() (Choose three.)

  • A、FTP
  • B、SSH
  • C、UDP
  • D、HTTPS
  • E、Traceroute

相似考题
更多“Which three applications are dis”相关问题
  • 第1题:

    Which three protocols or applications should be placed in a class that is configured with WRED?()

    • A、HTTP
    • B、RTP
    • C、streaming video
    • D、BitTorrent
    • E、POP3

    正确答案:A,D,E

  • 第2题:

    Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()

    • A、device-specific
    • B、on-premises
    • C、integrated
    • D、hybrid
    • E、virtual
    • F、SaaS

    正确答案:B,D,F

  • 第3题:

    Which three are benefits of A virtualized data center solution over A typical implementation?()

    • A、simplified cabling
    • B、more efficient routing
    • C、fewer applications per server
    • D、more efficient power consumption
    • E、more control over each server
    • F、less rack space

    正确答案:A,D,F

  • 第4题:

    Which three characteristics apply to IS - IS but not to OSPF?()

    • A、uses a default IOS metric of 10 on each interface
    • B、uses an on - demand circuit to reduce the hello and LSA flooding across switched WAN li nks,such as ISDN
    • C、uses a DIS and a backup DIS to present the psuedo - node on the LAN
    • D、encapsulates PDUs directly into a data - link frame
    • E、uses stubby areas to improve network scalability
    • F、runs PRC (Partial Route Calculations) to calculate IP re achability information

    正确答案:A,D,F

  • 第5题:

    Which three applications or protocols are accelerated by AppFlow?() (Choose three.)

    • A、UNIX NFS protocol
    • B、Web-based e-mail
    • C、Secure Sockets Layer
    • D、Microsoft's Common Internet File System
    • E、Microsoft's Messaging Application Programming Interface

    正确答案:B,D,E

  • 第6题:

    Which three types of integration does the Business Event System support?() (Choose three.)

    • A、point-to-point
    • B、parent/child messaging
    • C、messaging hub system
    • D、distributed applications messaging
    • E、simple object access protocol (SOAP) messaging

    正确答案:A,C,D

  • 第7题:

    多选题
    Which three applications are disabled for compression by default?() (Choose three.)
    A

    FTP

    B

    SSH

    C

    UDP

    D

    HTTPS

    E

    Traceroute


    正确答案: B,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which three protocols or applications should be placed in a class that is configured with WRED?()
    A

    HTTP

    B

    RTP

    C

    streaming video

    D

    BitTorrent

    E

    POP3


    正确答案: D,B
    解析: 暂无解析

  • 第9题:

    单选题
    Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three applications, which of the following is the BEST way to determine the cause of the crash?()
    A

    Launch REGEDIT and remove the offending applications from the Run key.

    B

    Start the computer in Safe Mode and check Event Viewer.

    C

    Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.

    D

    Hit the F6 key as Windows loads and run Repair Broken Links and Applications.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    There are three routers on a Gigabit Ethernet LAN: Router A, Router B, and Router C. Router A is the Designated Intermediate System (DIS) at Level 1 for that LAN. Router A's DIS priority is 64. The LAN is a Level 1-only link. Router D has just been powered up on that same LAN and its DIS priority is 80. Which statement is true?()
    A

    Router A remains the DIS and generates a new pseudonode LSP for that LAN

    B

    Router A remains the DIS and NO new pseudonode LSP is generated for that LAN

    C

    Router D becomes the new DIS, generates a new pseudonode LSP for that LAN, and purges the old pseudonode LSP generated by Router A

    D

    Router D becomes the new DIS, does NOT generate a new pseudonode LSP for that LAN, and does NOT purge the old pseudonode LSP generated by Router A


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which three are integrated Smart Applications included with the Cisco Unified Communications 500 Series? ()
    A

    Smart Business Suite

    B

    VoiceView Express

    C

    TimeCard View

    D

    Cisco Unified CallConnector

    E

    Cisco WebEx PhoneConnect

    F

    Connected Data Protector


    正确答案: F,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three are benefits of A virtualized data center solution over A typical implementation?()
    A

    more efficient power consumption

    B

    fewer applications per server

    C

    less rack space

    D

    more efficient routing

    E

    more control over each server

    F

    simplified cabling


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    Which three statements are true about the application of QoS models? ()

    • A、 The DiffServ model requires applications to signal the network with QoS requirements.
    • B、 The DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addresses.
    • C、 The DiffServ model requires RSVP.
    • D、 The best effort model is suitable for applications such as file transfer and e-mail
    • E、 The IntServ model requires applications to signal the network with QoS requirements.
    • F、 The IntServ model attempts to deliver a level of service based on the QoS specified by each packet

    正确答案:B,D,E

  • 第14题:

    Which three are integrated Smart Applications included with the Cisco Unified Communications 500 Series? ()

    • A、 Smart Business Suite
    • B、 VoiceView Express
    • C、 TimeCard View
    • D、 Cisco Unified CallConnector
    • E、 Cisco WebEx PhoneConnect
    • F、 Connected Data Protector

    正确答案:C,D,E

  • 第15题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第16题:

    Which three statements are true about the appliance of QoS models?()

    • A、the DiffServ model requires applications to signal the network with QoS requirements
    • B、the DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addresses
    • C、the DiffServ model requires RSVP
    • D、the best effort model is suitable for applications such as file transfer and e-mail
    • E、the IntServ model requires applications to signal the network with QoS requirements
    • F、the IntServ model model attempts to deliver a level of service based on the QoS specified by each packet

    正确答案:B,D,E

  • 第17题:

    Three IS-IS routers on a broadcast segment have different priority values configured. Which router is elected the DIS on that broadcast segment?()

    • A、the router with the lowest priority
    • B、the router with the highest priority
    • C、the router with the highest System ID
    • D、the router with the highest IP address

    正确答案:B

  • 第18题:

    单选题
    Three IS-IS routers on a broadcast segment have different priority values configured. Which router is elected the DIS on that broadcast segment?()
    A

    the router with the lowest priority

    B

    the router with the highest priority

    C

    the router with the highest System ID

    D

    the router with the highest IP address


    正确答案: B
    解析: 暂无解析

  • 第19题:

    多选题
    Which three types of integration does the Business Event System support?() (Choose three.)
    A

    point-to-point

    B

    parent/child messaging

    C

    messaging hub system

    D

    distributed applications messaging

    E

    simple object access protocol (SOAP) messaging


    正确答案: D,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three characteristics apply to IS - IS but not to OSPF?()
    A

    uses a default IOS metric of 10 on each interface

    B

    uses an on - demand circuit to reduce the hello and LSA flooding across switched WAN li nks,such as ISDN

    C

    uses a DIS and a backup DIS to present the psuedo - node on the LAN

    D

    encapsulates PDUs directly into a data - link frame

    E

    uses stubby areas to improve network scalability

    F

    runs PRC (Partial Route Calculations) to calculate IP re achability information


    正确答案: D,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which three statements are true about the appliance of QoS models?()
    A

    the DiffServ model requires applications to signal the network with QoS requirements

    B

    the DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addresses

    C

    the DiffServ model requires RSVP

    D

    the best effort model is suitable for applications such as file transfer and e-mail

    E

    the IntServ model requires applications to signal the network with QoS requirements

    F

    the IntServ model model attempts to deliver a level of service based on the QoS specified by each packet


    正确答案: F,C
    解析: 暂无解析

  • 第22题:

    多选题
    Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()
    A

    device-specific

    B

    on-premises

    C

    integrated

    D

    hybrid

    E

    virtual

    F

    SaaS


    正确答案: C,F
    解析: 暂无解析

  • 第23题:

    多选题
    Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
    A

    UNIX NFS protocol

    B

    Web-based e-mail

    C

    Secure Sockets Layer

    D

    Microsoft's Common Internet File System

    E

    Microsoft's Messaging Application Programming Interface


    正确答案: C,E
    解析: 暂无解析