A.end-to-end delay
B.interference from bulk data traffic
C.processing delays
D.serialization delays
E.jitter
您可能感興趣的試卷
你可能感興趣的試題
A.centralized management for autonomous access points
B.centralized management for lightweight access points
C.integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D.integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E.the inclusion of an integrated AAA server F an external AAA-server requirement
A.QoS can be enabled on interfaces used for Easy VPN clients
B.QoS can be enabled on IPsec VPN interfaces and tunnels
C.QoS can be enabled on interfaces with an existing QoS policy
D.the QoS policy can be enabled for incoming and outgoing traffic on the interface
A.first-in, first-out queuing (FIFO)
B.priority queuing (PQ)
C.custom queuing (CQ)
D.weighted fair queuing (WFQ)
E.class-based WFQ (CBWFQ)
F.low latency queuing (LLQ)
A.admission control
B.DSCP classification
C.monitoring
D.marking
E.scheduling
A.EAP-FAST has the ability to tie login with non-Microsoft user databases
B.EAP-TLS supports static passwords
C.PEAP supports one-time passwords
D.LEAP does not support multiple operating systems
E.LEAP supports Layer 3 roaming
F.PEAP does not work with WPA
A.minimum bandwidth guarantee
B.average bandwidth guarantee
C.optimum bandwidth guarantee
D.maximum bandwidth rate
E.IP precedence F priority
A.gatekeeper multizone
B.Call Admission Control (CAC)
C.Automatic Alternate Routing (AAR)
D.Survivable Remote Site Telephony (SRST)
A.VPN traffic needs to be classified based on the Layer2 header information
B.VPN traffic needs to be classified based on the IP precedence or DSCP
C.VPN traffic needs to be classified based on IP flow or Layer 3 information, such as source and destination IP address
D.VPN traffic with Authentication Header (AH) needs to preserve the ToS byte
A.the two methods of authentication using the WEP encryption are open and shared key
B.the 802.11 standard defines WEP security using 128-bit keys
C.WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
D.WEP is a scalable encryption solution that uses static keys for authentication
E.WEP security provides only one-way authentication
F.WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
A.enabling modular QoS over Frame Relay
B.enabling Real-Time Transport Protocol (RTP) header compression
C.enabling distributed compressed Transmission Control Protocol
D.enabling latency and jitter reduction for Transmission Control traffic
E.enabling TCP header compression
最新試題
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
What are three Cisco Unified CallManager features? ()
Which two characteristics are common between traffic policing and traffic shaping?()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
What are two reasons to implement H·323 gatekeepers?()
Which two QoS classification and marking statements are true? ()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()