niusouti.com

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

题目
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

A. source port

B. output interface

C. next-hop IP address

D. source MAC address

E. destination IP address

F. next-hop MAC address


相似考题
更多“Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() ”相关问题
  • 第1题:

    Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

    • A、source port
    • B、output interface
    • C、next-hop IP address
    • D、source MAC address
    • E、destination IP address
    • F、next-hop MAC address

    正确答案:A,E

  • 第2题:

    What is the purpose of a network mask?()

    • A、It is used to identify the maximum hop count of a subnetwork
    • B、It is used to identify an IP address as either private or public
    • C、It is used to identify the network to which an IP address belongs
    • D、It is used to identify the total number of bits present in an IP address

    正确答案:C

  • 第3题:

    As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()

    • A、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
    • B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
    • C、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
    • D、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

    正确答案:B

  • 第4题:

    Which statement is correct regarding NBAR and NetFlow?()

    • A、NetFlow uses five key fields for the flow
    • B、NBAR examines data in Layers 3 and 4
    • C、NetFlow examines data in Layers 3 and 4
    • D、NBAR examines data in Layers 2 through 4
    • E、NetFlow examines data in Layers 2 through 4

    正确答案:B

  • 第5题:

    Which of the following multimeter settings should only be used when there is no electrical flow through the part being tested? ()(Select TWO).

    • A、Ampere
    • B、Continuity
    • C、Volt
    • D、Resistance
    • E、Wattage

    正确答案:B,D

  • 第6题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第7题:

    多选题
    Which two statements regarding asymmetric key encryption are true?()
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption


    正确答案: C,B
    解析: 暂无解析

  • 第8题:

    多选题
    Which of the following multimeter settings should only be used when there is no electrical flow through the part being tested? ()(Select TWO).
    A

    Ampere

    B

    Continuity

    C

    Volt

    D

    Resistance

    E

    Wattage


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which descriptions of Netflow is correct?()
    A

    By default,Netflow records bidirectional IP traffic flow.

    B

    Netflow answers questions regarding IP traffic:who,what,where,when,and how

    C

    Netflow accounts for both transit traffic and traffic destined for the router.

    D

    Netflow returns the subinterface information in the flow records.


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()
    A

    source port

    B

    output interface

    C

    next-hop IP address

    D

    source MAC address

    E

    destination IP address

    F

    next-hop MAC address


    正确答案: E,C
    解析: 暂无解析

  • 第12题:

    多选题
    Cisco IOS NetFlow gathers data that can be used in which three of these? ()
    A

    accounting

    B

    authentication

    C

    authorization

    D

    network monitoring

    E

    network planning


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    Cisco IOS NetFlow gathers data that can be used in which three of these? ()

    • A、 accounting
    • B、 authentication
    • C、 authorization
    • D、 network monitoring
    • E、 network planning

    正确答案:A,D,E

  • 第14题:

    Which four statements about NetFlow are true?()

    • A、NetFlow records bidirectional IP traffic flow.
    • B、NetFlow export can be implemented over IPv4.
    • C、NetFlow export can be implemented over IPv6.
    • D、NetFlow records multicast IP traffic flow.
    • E、NetFlow records ingress traffic.
    • F、NetFlow records egress traffic.

    正确答案:B,D,E,F

  • 第15题:

    What Netflow component can be applied to an interface to track IPv4 traffic?()

    • A、flow monitor
    • B、flow record
    • C、flow sampler
    • D、flow

    正确答案:A

  • 第16题:

    How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()

    • A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
    • B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
    • C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
    • D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

    正确答案:B

  • 第17题:

    What is the purpose of a network mask?()

    • A、It is used to identify the maximum hop count of a subnetwork.
    • B、It is used to identify an IP address as either private or public.
    • C、It is used to identify the network to which an IP address belongs.
    • D、It is used to identify the total number of bits present in an IP address.

    正确答案:C

  • 第18题:

    多选题
    Which two fields are found in an Ethernet frame header?()
    A

    TTL

    B

    flags

    C

    checksum

    D

    type


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    单选题
    Which statement is correct regarding NBAR and NetFlow?()
    A

    NetFlow uses five key fields for the flow

    B

    NBAR examines data in Layers 3 and 4

    C

    NetFlow examines data in Layers 3 and 4

    D

    NBAR examines data in Layers 2 through 4

    E

    NetFlow examines data in Layers 2 through 4


    正确答案: E
    解析: 暂无解析

  • 第20题:

    多选题
    Which two fields are found in an Ethernet frame?()
    A

    Version

    B

    TTL

    C

    Checksum

    D

    Flags

    E

    Data


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used to identify the maximum hop count of a subnetwork

    B

    It is used to identify an IP address as either private or public

    C

    It is used to identify the network to which an IP address belongs

    D

    It is used to identify the total number of bits present in an IP address


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three statements about NetFlow are true?()
    A

    NetFlow records unidirectional IP traffic flow.

    B

    NetFlow records MPLS frame flow.

    C

    NetFlow expert is only over TCP.

    D

    NetFlow records is only over UDP.

    E

    NetFlow records subinterface information of traffic flow.


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used to identify the maximum hop count of a subnetwork.

    B

    It is used to identify an IP address as either private or public.

    C

    It is used to identify the network to which an IP address belongs.

    D

    It is used to identify the total number of bits present in an IP address.


    正确答案: C
    解析: 暂无解析