A.WMM using DCF
B.WMM using EDCAF
C.802.1e using DCF
D.802.1e using EDCAF
您可能感興趣的試卷
你可能感興趣的試題
A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
A.5
B.15
C.25
D.35
E.45
F.55
A.bursty
B.constant
C.bandwidth intensive
D.small packet sizes
E.time-sensitive
F.retransmittable
A.IP
B.TCP
C.RTP
D.UDP
E.H323
F.CRTP
A.the VoIP endpoints have the intelligence to set up and control calls
B.Call setup and control functionality is centralized in one call agent or cluster
C.Call setup and control resides in call agents that are distributed throughout the network
D.Each VoIP device has separate call control, voice packetization, and transport mechanisms
最新試題
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
Which two characteristics are common between traffic policing and traffic shaping?()
In a VoIP network, which type of interface would an analog fax machine connect to?()
Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
What are the three models of quality of service (QoS) in a network?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
Which three functions can an Integrated Services Router perform in a VoIP network?()
What are two reasons to implement H·323 gatekeepers?()