QoS policies are applied on the switches of a LAN. Which type of command will show the effects of the policy in real time?()
A、show command
B、debug command
C、configuration command
D、rommon command
A、show command
B、debug command
C、configuration command
D、rommon command
A、QoS can be enabled on interfaces used for Easy VPN clients B、QoS can be enabled on IPsec VPN interfaces and tunnels C、QoS can be enabled on interfaces with an existing QoS policy D、the QoS policy can be enabled for incoming and outgoing traffic on the interface
A、The new sessions matching the policy are denied. The existing sessions are dropped. B、The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout. C、The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped. D、The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.
A、Configure a class map that sets the DE bit so that the policy map can correctly apply a violate-action if the policy is exceeded. B、Configure a service policy that sets the DE bit and apply it to the serial interface connected to the Frame Relay WAN. C、Configure a policy map that has a burst-max action of setting the DE bit if the policy is exceeded. D、Configure a policy map that has a violate-action to change the DE bit from 0 to 1.
A、A. The new sessions matching the policy are denied. The existing sessions are dropped. B、B. The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout. C、C. The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped. D、D. The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
A、UTM profiles are applied on a security policy by policy basis. B、UTM profiles are applied at the global policy level. C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis. D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.
A、Import policies are used to filter routes from the routing table to the forwarding table. B、Import policies are used to filter routes destined for the routing table. C、Import policies are used to filter routes being sent to neighboring devices. D、Import policies are used to filter traffic entering the device.