Network Bandwidth Management Quiz
25 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which authentication level requires a password to contain at least one non-alphanumeric character?

  • High (correct)
  • Low
  • None
  • Medium
  • At which authentication level must user names be at least six characters in length and contain at least two alphabetic characters?

  • None
  • Low
  • High
  • Medium (correct)
  • At which authentication level must a password contain at least one numeric character and at least one non-alphanumeric character?

  • High
  • None
  • Low
  • Medium (correct)
  • Which authentication level requires user names to be at least six characters in length and contain at least two alphabetic characters?

    <p>Medium</p> Signup and view all the answers

    At which authentication level is it required that a password contains at least one numeric character and at least one non-alphanumeric character, and has a length of at least 15 characters?

    <p>High</p> Signup and view all the answers

    At which authentication level can the SuperUser password of a TPS device not be recovered but can be reset to a new value or a new login with SuperUser privileges be created?

    <p>None</p> Signup and view all the answers

    At which authentication level must user names be at least six characters in length, contain at least two alphabetic characters, and contain at least one uppercase character?

    <p>High</p> Signup and view all the answers

    At which authentication level is it required that half the characters of the password cannot occupy the same positions as the current password?

    <p>High</p> Signup and view all the answers

    What is the potential drawback of implementing rate limiting for flows being inspected or examined?

    <p>Creation of latency and other issues</p> Signup and view all the answers

    When is rate limiting considered a guarantee of bandwidth?

    <p>When implemented for the entire class of traffic based on TCP port</p> Signup and view all the answers

    How can the use of trust TMF affect the performance of certain applications?

    <p>Cause jitter and packet delivery issues</p> Signup and view all the answers

    What type of applications is it common and recommended to use Block or Allow based on ports or protocols for?

    <p>Streaming media applications</p> Signup and view all the answers

    Why may the use of trust TMF cause streaming media clients to suffer?

    <p>Possible creation of jitter and out-of-order packet delivery</p> Signup and view all the answers

    What is the purpose of rate limiting an entire class of traffic based on TCP port?

    <p>To preserve bandwidth for other applications</p> Signup and view all the answers

    In what scenario would the deeper detailed inspection fail according to the text?

    <p>When data triggers some filters' triggers</p> Signup and view all the answers

    Why are streaming media clients more sensitive to certain conditions according to the text?

    <p>As a result of possible jitter and out-of-order packet delivery</p> Signup and view all the answers

    What is the recommended action for monitoring traffic mix and packet sizes?

    <p>Baseline and continuously monitor the average mix of packet-sizes</p> Signup and view all the answers

    Why should new applications not rely on excessive small or fragmented packets?

    <p>To avoid issues related to packet fragmentation</p> Signup and view all the answers

    What should be monitored in the context of protocols?

    <p>Monitor protocols prone to fragmentation and anomalies</p> Signup and view all the answers

    Why should filters 28987 and 29276 be used cautiously?

    <p>They may fill the 'Trusted Flows' table on the device</p> Signup and view all the answers

    What action should be taken with regular device snapshots?

    <p>Archive them to SMS</p> Signup and view all the answers

    What should be done to assign a product capability from the license package to a security device?

    <p>Update the license package</p> Signup and view all the answers

    Why is it important to verify the sufficiency of inspection throughput in the product license?

    <p>To avoid reduced inspection throughput</p> Signup and view all the answers

    What is the implication of a TPS security device being unlicensed by default?

    <p>It offers reduced inspection throughput for testing and evaluation purposes only</p> Signup and view all the answers

    Why should SSL or QUIC traffic be carefully monitored?

    <p>'Trusted Flows' table overflow may occur</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser