exam questions

Exam 300-320 All Questions

View all questions & answers for the 300-320 exam

Exam 300-320 topic 1 question 207 discussion

Actual exam question from Cisco's 300-320
Question #: 207
Topic #: 1
[All 300-320 Questions]

An organization is creating a detailed QoS plan that limits bandwidth to specific rates. Which three parameters can be configured when attempting to police traffic within the network? (Choose three.)

  • A. Violating
  • B. Committed information rate
  • C. Peak information rate
  • D. Shaping rate
  • E. Bursting
  • F. Conforming
  • G. Exceeding
Show Suggested Answer Hide Answer
Suggested Answer: EFG 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Scheldon
Highly Voted 5 years, 1 month ago
In ARCH 300-320 book we have: When you are using a dual-token bucket model, the measured traffic rate can be identified in three states or three colors: ■ Conforming: There are enough tokens in the first token bucket with a maximum size of Bc. ■ Exceeding: There are not enough tokens in the first token bucket, but there are enough tokens in the second token bucket with a maximum size of Be. ■ Violating: There are not enough tokens in the first or second token bucket. But in question, the question is about parameters not actions/states, and from all answers only Committed information Rate (CIR), Peak information Rate (PIR) and Shaping rate we can consider as programable parameters. Answers for me are B,C,D.
upvoted 5 times
...
nicey999
Most Recent 4 years, 9 months ago
A F G appears in most literature but one of those where a case can be made for more than 3 - i would go A F G though
upvoted 1 times
...
Mahbod
4 years, 11 months ago
A,F,G When you are using a dual-token bucket model, the measured traffic rate can be identified in three states or three colors: ■ Conforming: There are enough tokens in the first token bucket with a maximum size of Bc. ■ Exceeding: There are not enough tokens in the first token bucket, but there are enough tokens in the second token bucket with a maximum size of Be. ■ Violating: There are not enough tokens in the first or second token bucket.
upvoted 2 times
...
Parot
5 years, 4 months ago
Agree with bella, as per cisco: Packets coming into interface are evaluated by the token bucket algorithm to analyze whether packets conform, exceed, or violate the parameters: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-book/qos-plcshp-trfc-plc.pdf
upvoted 2 times
...
bella
5 years, 5 months ago
the answer is clearly written in the ARCH book When you are using a dual-token bucket model, the measured traffic rate can be identified in three states or three colors: ■ Conforming: There are enough tokens in the first token bucket with a maximum size of Bc. ■ Exceeding: There are not enough tokens in the first token bucket, but there are enough tokens in the second token bucket with a maximum size of Be. ■ Violating: There are not enough tokens in the first or second token bucket. so the correct answer is A, F, G
upvoted 3 times
...
malahughes
5 years, 5 months ago
Other sources indicate B C E
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago