Traffic Shaping does which one of the following?
A. Eliminates bottlenecks by throttling back traffic volume
at the source or outbound end
B. Reduces the frame size so bandwidth is better utilized
C. It increases source traffic to a configured bit rate
D. Allows you to control hubs and repeaters
Answer / guest
Answer: A
Traffic Shaping eliminates bottlenecks by throttling back
traffic volume at the source or outbound end. It allows an
administrator to manage and control network traffic by using
access lists to select the traffic they want to shape.
Traffic Shaping can be used with Frame Relay, ATM, SMDS, and
Ethernet.
| Is This Answer Correct ? | 1 Yes | 0 No |
What is the standard ethernet cabling specification? (not IEEE 802.3) A. STP B. Coax (thin) C. Coax (thick) D. UTP
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX
Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.