A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
您可能感興趣的試卷
你可能感興趣的試題
Which routing protocol best fits these requirements?()
- Supported by multiple router vendors
- Requires minimum router CPU and memory resources
- Uses a simple routing metric
- Supports manual or automatic route summarization
A.EIGRP
B.OSPF
C.IS-IS
D.RIPv2
DRAG DROP
DRAG DROP
A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. optical technology for transmitting up to 32 channels over multiple fiber strands
B. optical technology for transmitting up to 16 channels over multiple fiber strands
C. a WDM system that is compatible with EDFA technology
D. a technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM .
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
A. intrusion protection
B. identity
C. secure connectivity
D. security management
最新試題
What is the recommended practice when considering VPN termination and firewall placement?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which of the following is the primary consideration to scale VPNs?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What is the recommended radius of a cell for a voice-ready wireless network?()