A.timing
B.queuing
C.differential
D.serialization
E.packetization
F.propagation
您可能感興趣的試卷
你可能感興趣的試題
A.latency must be kept below 150 ms
B.latency is not a concern as long as jitter is kept below 30 ms
C.voice packets do not require a specific type of queuing
D.voice packets are rather small
E.voice packets require TCP for rapid retransmission of dropped packets
F.voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
A.header compression
B.payload compression
C.low latency queuing (LLQ)
D.weighted random early detection (WRED)
E.traffic policing
F.traffic shaping
A.a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol
B.RSVP uses DSCP to signal QoS requirements to routers
C.RSVP is a routing protocol
D.RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455
E.RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic
F.the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP)
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) 
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
A.WMM using DCF
B.WMM using EDCAF
C.802.1e using DCF
D.802.1e using EDCAF
A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
A.5
B.15
C.25
D.35
E.45
F.55
A.bursty
B.constant
C.bandwidth intensive
D.small packet sizes
E.time-sensitive
F.retransmittable
A.IP
B.TCP
C.RTP
D.UDP
E.H323
F.CRTP
最新試題
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()
What are three Cisco Unified CallManager features? ()
Which three user interfaces exist for the Cisco WLAN Controllers?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
What is an advantage of the IntServ QoS model?()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()