單項選擇題

Refer to the exhibit. 

What is the sequence of events when a VoIP call is placed from IP phone P1 to IP phone P2? ()

A.RTP traffic is exchanged between IP phone P1 and IP phone P2. IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2.
B.CCM instructs IP phone P1 to provide dialtone. IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2. 
C.CCM instructs IP phone P1 to provide dialtone.IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. RTP traffic is exchanged between IP phone P1 and IP phone P2. CCM routes call to PSTN or IP phone P2.
D.IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Exhibit:

You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys.
 What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()

A.The wireless client adapter will not be authenticated by the authentication server, but the access point deliver the packets to the intended receiver.
B.The wireless client adapter will not be able to send any packets to the access point.
C.The access point will discard the packets and never deliver them to the intended receiver.
D.The wireless client adapter will be authenticated by the authentication server and the access point will deliver the packets to the intended receiver.

2.單項選擇題

Exhibit: 

You work as a network technician at. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility). 
What should you have in mind when doing this?()

A.Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points, servers, etc.) must be properly configured for LEAP authentication.
B.The client adapter WEP key should be generated by the AP and forwarded to the client adapter efore the client adapter can establish communication with the wireless network.
C.In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In ad hoc mode all client WEP keys within the wireless network must match each other.
D.The client adapter WEP key should be generated by the authentication server and forwarded to the client adapter before the client adapter can establish communication with the wireless network.
E.None of the other alternatives apply

3.單項選擇題What is the objective of the Cisco Compatible Extensions program?()

A.to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless code
B.to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless products
C.to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovations
D.to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

4.單項選擇題

Exhibit: 

You work as a network administrator at . You study the exhibit carefully. 
What information can be drawn from the output?()

A.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter, but traffic is still forwarded across the ports.
B.Interfaces FastEthernet3/1 and FastEthernet3/2 are candidate for becoming the STP root port, but neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on at least one of the interfaces.
C.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces automatically recover and resume normal operation.
D.Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a superior root bridge parameter and no traffic is forwarded across the ports.Once inaccurate BPDUs have been stopped, the interfaces will need to be administratively shut down, and brought back up, to resume normal operation.

5.單項選擇題

Exhibit:

You work as a network administrator at . You study the exhibit carefully. 
What can be drawn about VLANs 200 and 202 from the exhibit?()

A.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.
B.VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.
C.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.
D.VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.

最新試題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:單項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:單項選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項選擇題

During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題