Chapter 20. Quality of Service (QoS) Flashcards

1
Q
  1. Which of the following statements is correct?

A. The Snort engine not only evaluates but also enforces a QoS rule.

B. The Snort engine rate-limits traffic as soon as it receives it.

C. The firewall engine enforces the actual rate limit.

D. All of these answers are correct.

A

C. The Snort engine evaluates a QoS rule and classifies traffic. When a packet matches with a QoS rule, the Snort engine sends the ID of the matching rule to the firewall engine. Later, the firewall engine limits the rate of individual flows based on the download and upload speed limits defined on a QoS rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which step is necessary to view any QoS-related events?

A. In a QoS policy, enable logging at the beginning of a connection.

B. In a QoS policy, enable logging at the end of a connection.

C. In an access control policy, enable logging for a QoS rule.

D. In an access control policy, enable logging at the end of a connection.

A

D. In an access control policy, enable logging at the end of a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. How many rules can be added in a QoS policy?

A. 8

B. 16

C. 24

D. 32

A

D. Secure Firewall supports up to 32 QoS rules within a single QoS policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. To enable a QoS policy on an interface, a threat defense should be deployed in which mode?

A. Routed mode

B. Inline mode

C. Passive mode

D. Switched mode

A

A. Each interface participating in a QoS policy must be in routed mode. You cannot apply a QoS policy to an interface that is in inline mode, passive mode, or switched mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. To limit the download rate to 5 MB/sec, which value should you enter in a QoS rule?

A. 4

B. 5

C. 40

D. 50

A

C. 40 Mbps = 5 MB/sec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following commands confirms whether traffic is rate-limited by the threat defense?

A. show service-policy police

B. show conn detail

C. show asp drop

D. All of these answers are correct.

A

D. All of these answers are correct. These commands can provide information about the traffic rate limit and quality of service policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly