niusouti.com

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-ba

题目

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling.Given these types of applications, how many different classes will need to be configured in QoS?()

A. 8

B. 6

C. 9

D. 5


相似考题

2.You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

更多“You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the follo”相关问题
  • 第1题:

    Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()

    • A、Create two virtual adapters on the client, each one from a separate Virtual IO Server
    • B、Enable dead gateway detection on the client so that the network traffic can be rerouted
    • C、Have a spare network card on standby in the client in case the Virtual IO Server goes down
    • D、Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two  separate Virtual IO Servers

    正确答案:A

  • 第2题:

    Which three practices are important to the implementation of a DiffServ QoS architecture?()

    • A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.
    • B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.
    • C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.
    • D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.
    • E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.
    • F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

    正确答案:C,D,F

  • 第3题:

    You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS. Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?()

    • A、The phones are not sending traffic with the correct DSCP value.
    • B、The Cisco CallManager is not marking the traffic correctly.
    • C、This is most likely a bug on the CE routers.
    • D、Your LAN QoS is incorrectly configured.

    正确答案:D

  • 第4题:

    You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()

    • A、8
    • B、6
    • C、9
    • D、5

    正确答案:A

  • 第5题:

    A customer has just purchased an 8-core POWER 570 which has two dual port 1 Gbps  Integrated Virtual Ethernet (IVE) adapters. The customer wants to implement queue pairs (QPs) to take advantage of parallel processing of network traffic to its client logical partitions. Assuming that the system is to utilize the IVEs in both CECs,  which configuration will allow a logical partition to utilize the entire eight cores for network traffic processing?()

    • A、 Set Multiple Core Scaling (MCS) value of the port group to 8 and set multiple core parameter of the client Ethernet adapters to yes.
    • B、 Set Multiple Core Scaling (MCS) value of the port group to 4 and set multiple core parameter of the client Ethernet adapters to yes.
    • C、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 4 and set multiple core parameter of the client Ethernet adapters to yes.
    • D、 Set Multiple Core Scaling (MCS) value of one of the physical port groups to 8 and set the multiple core parameter of the client Ethernet adapters to yes.

    正确答案:A

  • 第6题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named Client Docs on a member server named TestKing13. Client Docs will store project documents. You configure shadow copies for the volume containing Client Docs. You need to enable client computers to access previous version of the documents in Client Docs. What should you do?()

    • A、Create a Group Policy object (GPO) to enable Offline Files on all client computers.
    • B、On each client computer, customize the view for Client Docs to use the Documents (for any file type) folder template.
    • C、Create a Group Policy object (GPO) that installs the Previous Versions client software on all client computers.
    • D、Assign the Allow - Full Control permission on Client Docs to all users.
    • E、On each client computer, install the Backup utility and schedule a daily backup.

    正确答案:C

  • 第7题:

    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

    • A、RemoteApp and Desktop Connections
    • B、software installation in Group Policy
    • C、Microsoft Application Virtualization (App-V)
    • D、Microsoft System Center Configuration Manager 2007

    正确答案:A

  • 第8题:

    All client computers in your company run Windows 7 Enterprise. Users run Windows XP Mode guest virtual machines (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()

    • A、Set each VM network adapter to Not connected.
    • B、Configure each VM to use one Internal Network network adapter.
    • C、Configure each VM to use one Shared Networking (NAT) network adapter.
    • D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic, and remove all other Windows Firewall exceptions.

    正确答案:B

  • 第9题:

    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()

    • A、Publish the application as a RemoteApp.
    • B、Publish the application by using Remote Desktop Web Access (RD Web Access).
    • C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).
    • D、Assign the application to all client computers by using a Group Policy object (GPO).

    正确答案:D

  • 第10题:

    单选题
    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()
    A

    Publish the application as a RemoteApp.

    B

    Publish the application by using Remote Desktop Web Access (RD Web Access).

    C

    Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).

    D

    Assign the application to all client computers by using a Group Policy object (GPO).


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()
    A

    Modify the GPO to change the Driver Signing option. 

    B

    Run theSigverifcommand on each client computer.

    C

    Reconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.

    D

    Modify the Hisecws.inf security template on each client computer to change the Driver Signing     option.

    E

    Modify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has 1,000 client computers that run Windows XP Professional x64.   You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64.   You have the following requirements:   Provide all users with access to the application.   Deploy and manage the application by using a centralized solution.  You need to design a solution that meets the requirements.   What should you do?()
    A

     Install the application on all client computers by using Group Policy,and then use the Compatibility tab.

    B

     Install the Microsoft Enterprise Desktop Virtualization(MED-V) v2 package on each client computer.

    C

     Install the Microsoft Application Virtualization(App-V) client on each client computer,and stream the application byusing App-V.

    D

     Install the Microsoft Application Virtualization(App-V) client on each client computer,and run the application in offline mode.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

    • A、ICMP
    • B、SNMP
    • C、TCP
    • D、HTTPS

    正确答案:A,C

  • 第14题:

    An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each, terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs, and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue.What action will likely fix this problem?()

    • A、mark VOIP traffic with IP precedence 6 and configure only ’fair-queue’ on the links
    • B、configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles
    • C、enable class-based traffic shaping on the VoIP traffic class
    • D、enable Layer 2 fragmentation and interleaving on the links
    • E、enable Frame Relay on the links and send voice and data on different Frame Relay PVCs

    正确答案:D

  • 第15题:

    Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()

    • A、qos-group
    • B、DSCP
    • C、LFI
    • D、NBAR

    正确答案:D

  • 第16题:

    Which of the following is the purpose of QoS?()

    • A、Load balance traffic across multiple LAN and WAN links.
    • B、Increase speed of network traffic.
    • C、Classify, mark, and prioritize traffic on WAN and LAN links
    • D、Guarantee traffic delivery.

    正确答案:C

  • 第17题:

    Your company has 1,000 client computers that run Windows XP Professional x64.   You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64.   You have the following requirements:   Provide all users with access to the application.   Deploy and manage the application by using a centralized solution.  You need to design a solution that meets the requirements.   What should you do?()

    • A、 Install the application on all client computers by using Group Policy,and then use the Compatibility tab.
    • B、 Install the Microsoft Enterprise Desktop Virtualization(MED-V) v2 package on each client computer.
    • C、 Install the Microsoft Application Virtualization(App-V) client on each client computer,and stream the application byusing App-V.
    • D、 Install the Microsoft Application Virtualization(App-V) client on each client computer,and run the application in offline mode.

    正确答案:B

  • 第18题:

    You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()

    • A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROM
    • B、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.
    • C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.
    • D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

    正确答案:A

  • 第19题:

    All client computers in your company run Windows 7 Enterprise.Users run Windows XP Mode guest virtual machi nes (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()

    • A、Set each VM network adapter to Not connected.
    • B、Configure each VM to use one Internal Network network adapter.
    • C、Configure each VM to use one Shared Networking (NAT) networ k adapter.
    • D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic,and remove all other Windows Firewall exceptions.

    正确答案:B

  • 第20题:

    Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()

    • A、Install the application on a Remote Desktop Services server.
    • B、Install a shim for the application on each client computer.
    • C、Install the Windows Compatibility Evaluator on each client computer.
    • D、Virtualize the application by using Microsoft Application Virtualization (App-V).

    正确答案:B

  • 第21题:

    A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()

    • A、On the OperationContractAttribute, set the AsyncPattern property value to true.
    • B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.
    • C、On the client, create a proxy derived from DuplexClientBase<TChannel >.
    • D、On the client, use GetCallbackChannel<T >.

    正确答案:C

  • 第22题:

    单选题
    You have two Exchange Server 2010 servers that have the Client Access, Hub Transport, and Mailbox server roles installed.The servers are members of a database availability group (DAG).You need to ensure that all users can access the Client Access server if a single server or service fails.What should you do?()
    A

    from DNS manager, create two new records for the Client Access servers.

    B

    from Failover Cluster Manager, create a new service named Client Access Server and assign a new IP address.

    C

    Install the Network Load Balancing feature on each server and assign a second IP address to each network adapter.

    D

    Deploy a hardware load balancer.Create a DNS record for the virtual IP address and configure a Client Access server array.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()
    A

    Use Network Monitor to capture traffic between Server1 and all client computers.

    B

    Use Network Monitor to capture traffic between Server1 and Server2.

    C

    Monitor Event Viewer for Net Logon error or warning events.

    D

    Run the tracert command on Server1.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()
    A

    On the OperationContractAttribute, set the AsyncPattern property value to true.

    B

    On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.

    C

    On the client, create a proxy derived from DuplexClientBase<TChannel >.

    D

    On the client, use GetCallbackChannel<T >.


    正确答案: D
    解析: 暂无解析