FTP
SSH
UDP
HTTPS
Traceroute
第1题:
A. latency and loss
B. compression results
C. traffic (by application)
D. CRC and alignment errors
E. user access (by username)
第2题:
Which three statistics does the Executive report summarize?() (Choose three.)
第3题:
Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose three.)()
第4题:
Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
第5题:
Which three types of integration does the Business Event System support?() (Choose three.)
第6题:
Apply the method list to an interface
Specify the default method list and apply it to the interface
Enable AAA
Define a method list
第7题:
FTP
SSH
UDP
HTTPS
Traceroute
第8题:
UNIX NFS protocol
Web-based e-mail
Secure Sockets Layer
Microsoft's Common Internet File System
Microsoft's Messaging Application Programming Interface
第9题:
one-rate rate limiters
two-rate rate limiters
two-rate rate limiters is the default
one-rate rate limiters is the default
there is no default it must be configured
第10题:
point-to-point
parent/child messaging
messaging hub system
distributed applications messaging
simple object access protocol (SOAP) messaging
第11题:
The CoS value is trusted for 802.1p or 802.1q tagged traffic.
The voice VLAN feature is disabled by default.
The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
PortFast is automatically disabled when a voice VLAN is configured.
The default CoS value for incoming traffic is set to 0.
第12题:
Send
Raise
Delete
Receive
Acknowledge
第13题:
Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)
第14题:
Which three applications are disabled for compression by default?() (Choose three.)
第15题:
Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)
第16题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第17题:
Idle
Active
Connect
Open Sent
Established
第18题:
buffering
cut-through
windowing
congestion avoidance
load balancing
第19题:
HDLC
Ethernet
Token Ring
PPP
FDDI
Frame Relay
第20题:
routing-instance
zone
interface
policy
rule-set
第21题:
antispam
antivirus
IPS
application firewalling
Web filtering
第22题:
transparent
auto
on
desirable
blocking
forwarding
第23题:
IGP
BGP
EGP
Incomplete
Anonymous