niusouti.com

多选题What are two characteristics of the RED algorithm as implemented in JUNOS software?()AIt profiles based on bandwidth.BIt profiles based on loss priority.CIt prevents traffic loss through buffering.DIt prevents global synchronization with tail drops.

题目
多选题
What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A

It profiles based on bandwidth.

B

It profiles based on loss priority.

C

It prevents traffic loss through buffering.

D

It prevents global synchronization with tail drops.


相似考题
更多“What are two characteristics of the RED algorithm as impleme”相关问题
  • 第1题:

    A vessel not under command shall display ______.

    A.two red lights at night and two black balls during daylight

    B.two red lights at night and three black balls during daylight

    C.three red lights at night and two black balls during daylight

    D.three red lights at night and three black balls during daylight


    正确答案:A

  • 第2题:

    There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (1)处应选________.


    A. stream
    B.symmetric
    C. asymmetric
    D.advanced

    答案:B
    解析:

  • 第3题:

    首楼甲板涂上两度红丹漆和干舷漆。()

    • A、Apply two coats of red lead primer and topside paint to the forecastle deck.
    • B、Apply two coats of red lead primer and boottopping paint to the forecastle deck.
    • C、Apply two coats of topside paint and red lead primer to the poop deck.
    • D、Apply two coats of red lead primer and topside paint to the poop deck.

    正确答案:A

  • 第4题:

    What are two characteristics of Telnet (Choose two.)()。

    • A、Itsendsdataincleartextformat.
    • B、ItisnolongersupportedonCisconetworkdevices.
    • C、ItismoresecurethanSSH
    • D、Itrequiresanenterpriselicenseinordertobeimplemented.
    • E、ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

    正确答案:A,E

  • 第5题:

    What are two characteristics of Telnet? (Choose two.)()

    • A、It sends data in clear text format.
    • B、It is no longer supported on Cisco network devices.
    • C、It is more secure than SSH
    • D、It requires an enterprise license in order to be implemented.
    • E、It requires that the destination device be configured to support Telnet connections.

    正确答案:A,E

  • 第6题:

    What are two characteristics of the DiffServ model?()

    • A、service guarantee
    • B、traffic that is divided into classes
    • C、not scalable to large implementations
    • D、QoS mechanisms that are used without prior signaling
    • E、applications that signal their particular QoS and bandwidth requirements

    正确答案:B,D

  • 第7题:

    What are two characteristics of multi-field classification?()

    • A、implemented with firewall filters
    • B、typically configured on core routers
    • C、typcially configured on customer facing routers
    • D、implemented with Behavior Aggregate (BA) classification

    正确答案:A,C

  • 第8题:

    多选题
    What are two characteristics of multi-filed classification?()
    A

    Implemented with firewall filters.

    B

    Typically configured on core routers.

    C

    Typically configured on customer facing routers.

    D

    Implemented with Behavior Aggregate (BA) classification.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    Cisco Small Business Switches are specifically engineered for the small business customer. What are two characteristics common to Cisco Small Business Switches?()
    A

    remote management

    B

    integrated telephony

    C

    do-it-yourself installation and management

    D

    experienced IT support required

    E

    single-site connectivity


    正确答案: E,B
    解析: 暂无解析

  • 第10题:

    多选题
    What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
    A

    facilitates customer deployments that are less reliable

    B

    facilitates customer deployments that are more predictable

    C

    separates products and technologies into individual portfolios

    D

    incorporates products and technologies into a broad portfolio

    E

    strives to protect access to design documentation


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    多选题
    What are two characteristics of a managed Cisco Small Business Switch when recommending it over an unmanaged switch? ()
    A

    end-user installed and supported

    B

    VLAN support

    C

    low initial cost

    D

    desktop installation

    E

    web-controlled GUI


    正确答案: B,E
    解析: 暂无解析

  • 第12题:

    多选题
    What are two characteristics of RIPv2?()
    A

    classful routing protocol

    B

    variable-length subnet masks

    C

    broadcast addressing

    D

    manual route summarization

    E

    uses SPF algorithm to compute path


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( 4 )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (4)处应选_______.

    A. brute
    B. perfect
    C. atribue
    D. research

    答案:A
    解析:

  • 第14题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( 3 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
    (3)应选__________.



    A. message
    B. knowledge
    C. algorithm
    D.attack

    答案:D
    解析:

  • 第15题:

    What are two characteristics of a managed Cisco Small Business Switch when recommending it over an unmanaged switch? ()

    • A、 end-user installed and supported
    • B、 VLAN support
    • C、 low initial cost
    • D、 desktop installation
    • E、 web-controlled GUI

    正确答案:B,E

  • 第16题:

    What are two characteristics of the Cisco Validated Design program? ()(Choose two.)

    • A、facilitates customer deployments that are less reliable
    • B、facilitates customer deployments that are more predictable
    • C、separates products and technologies into individual portfolios
    • D、incorporates products and technologies into a broad portfolio
    • E、strives to protect access to design documentation

    正确答案:B,D

  • 第17题:

    What are two characteristics of the RED algorithm as implemented in JUNOS software?()

    • A、It profiles based on bandwidth.
    • B、It profiles based on loss priority.
    • C、It prevents traffic loss through buffering.
    • D、It prevents global synchronization with tail drops.

    正确答案:B,D

  • 第18题:

    What are two characteristics of RIPv2? ()

    • A、classful routing protocol
    • B、variable-length subnet masks
    • C、broadcast addressing
    • D、manual route summarization
    • E、uses SPF algorithm to compute path

    正确答案:B,D

  • 第19题:

    单选题
    At sea,on what occasion would you display two red lights at night or two black balls during the day?().
    A

    When vessel is on fire

    B

    When vessel is not under command

    C

    When vessel is carrying the dangerous cargoes

    D

    When vessel is restricted in her ability to maneuver


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    A vessel not under command shall display().
    A

    two red lights at night and two black balls during daylight

    B

    two red lights at night and three black balls during daylight

    C

    three red lights at night and two black balls during daylight

    D

    three red lights at night and three black balls during daylight


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    What are two characteristics of the RED algorithm as implemented in JUNOS software?()
    A

    It profiles based on bandwidth.

    B

    It profiles based on loss priority.

    C

    It prevents traffic loss through buffering.

    D

    It prevents global synchronization with tail drops.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    What are two characteristics of Telnet? (Choose two.)()
    A

    It sends data in clear text format.

    B

    It is no longer supported on Cisco network devices.

    C

    It is more secure than SSH

    D

    It requires an enterprise license in order to be implemented.

    E

    It requires that the destination device be configured to support Telnet connections.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    单选题
    On a chart,the characteristic of the light on a lighthouse is shown as flashing white with a red sector.The red sector().
    A

    Indicates the limits of the navigable channel

    B

    Indicates a danger area

    C

    Is used to identify the characteristics of the light

    D

    Serves no significant purpose


    正确答案: C
    解析: 暂无解析

  • 第24题:

    多选题
    What are two characteristics of Telnet (Choose two.)()。
    A

    Itsendsdataincleartextformat.

    B

    ItisnolongersupportedonCisconetworkdevices.

    C

    ItismoresecurethanSSH

    D

    Itrequiresanenterpriselicenseinordertobeimplemented.

    E

    ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.


    正确答案: D,C
    解析: 暂无解析