多項(xiàng)選擇題VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()

A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()

A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link

4.單項(xiàng)選擇題

Look at the graphic below, the connectivity between Cisco IP phone access port and theworkstation CK-PC has been established, how to manage the traffic?()

A.The IP phone access port will override the priority of the frames received from the CK-PC
B.The IP phone access port would trust the priority of the frames received from the CK-PC
C.The switch port FaO/4 would neglect the priority of the frames received from the CK-PC
D.The switch port FaO/4 would trust the priority for the frames received from the CK-PC

5.單項(xiàng)選擇題

An IP phone connects a user to a switch as shown below:

Based on the diagram shown above, which statement is true about the voice traffic coming to theswitch access port that is connected to the IP phone?()

A.A PC connected to a switch port via an IP phone is unaware of the presence of the phone
B.The traffic on the voice VLAN must be tagged with 802.1p encapsulation in order to coexist onthe same LAN segment with a PC
C.To improve the quality of the voice traffic, no other devices should be attached to the IP phone
D.The voice VLAN must be configured as a native VLAN on the switch
E.A PC connected to a switch port via an IP phone must support a trunking encapsulation

最新試題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Match the xDSL type on the above to the most appropriate implementation on the below.

題型:問答題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:單項(xiàng)選擇題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Which statement about PPPoA configuration is correct?()

題型:單項(xiàng)選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項(xiàng)選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項(xiàng)選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項(xiàng)選擇題