Traffic Shaping does which one of the following?
A. Eliminates bottlenecks by throttling back traffic volume
at the source or outbound end
B. Reduces the frame size so bandwidth is better utilized
C. It increases source traffic to a configured bit rate
D. Allows you to control hubs and repeaters
Answer / guest
Answer: A
Traffic Shaping eliminates bottlenecks by throttling back
traffic volume at the source or outbound end. It allows an
administrator to manage and control network traffic by using
access lists to select the traffic they want to shape.
Traffic Shaping can be used with Frame Relay, ATM, SMDS, and
Ethernet.
| Is This Answer Correct ? | 1 Yes | 0 No |
What are two differences between 10BaseT and 100BaseT? A. Speed B. Frame format C. Addressing D. Network diameter
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS