A.The customer uses SNMP statistics to create the policy.
B.QoS policy templates are generated and installed on the interface.
C.RTP is used to generate the policy.
D.LLQ,cRTP,and LFI are used to automatically discover the policy.
E.The auto-generated policy is manually optimized before implementation.
F.Auto-discovery is used to determine what traffic is on the interface.
您可能感興趣的試卷
你可能感興趣的試題
A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
A.End-to-end delay is the sum of propagation delays,processing delays,serialization delays,and queuing delays.
B.Coast-to-coast end-to-end delay over an optical link is about 20 ms.
C.Processing delay depends on various factors,which include CPU speed,CPU utilization,IP switching mode, and router architecture.
D.Propagation and serialization delays are related to the media.
E.Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).
F.Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.
A.class-based weighted fair queuing (CBWFQ)
B.low latency queuing (LLQ)
C.priority queuing (PQ) or custom queuing (CQ)
D.Real-Time Transport Protocol (RTP) header compression
E.TCP header compression
F.UDP header compression
Refer to the exhibit. Both routers have been configured as VoIP gateways. They must also support traditional telephony devices to connect to analog telephones. Which two configuration changes would correctly support the voice requirements?()
A.On each router, under the dial-peer voice 1 pots configuration, add the port fa0/0 command.
B.On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/0 command.
C.On each router, configure dial-peer voice 1 as a voip connection and configure dial-peer voice 2 as a pots connection.
D.Under the dial-peer voice 1 pots configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
E.Under the dial-peer voice 2 voip configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
F.Under the dial-peer voice 2 voip configuration, change the destination target address of 10.2.2.2 to 10.1.1.1 on the R1 router, and the destination target address of 10.1.1.1 to 10.2.2.2 on the R2 router.
A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)
A.Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
B.Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.
C.Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
D.Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E.Configure video streaming. Configure audio streaming. Attach the codec to an interface.
A.5
B.15
C.25
D.35
E.45
F.55
A.Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.
B.Use the service-policy command to attach a traffic flow to an interface on the router.
C.Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.
D.Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.
E.Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.
F.Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
A.Implementing DiffServ involves the configuration of RSVP.
B.Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
C.Implementing IntServ involves the utilization of RSVP.
D.Traffic should be classified and marked by the core network devices.
E.Traffic should be classified and marked as close to the edge of the network as possible.
最新試題
Which three practices are important to the implementation of a DiffServ QoS architecture?()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
What are two reasons to implement H·323 gatekeepers?()
Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()
What is an advantage of the IntServ QoS model?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
In a VoIP network, which type of interface would an analog fax machine connect to?()
Within the WMM policy, how many default QoS radio access categories are there?()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()