A.802.1X
B.Cisco Temporal Key Integrity Protocol (CKIP)
C.Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
D.Cisco Message Integrity Check (CMIC)
E.One-Time Passwords (OTP)
F.Advanced Encryption Standard (AES)
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. The network has been configured with H.323 gateways and gatekeepers as shown. Which statement is true when a call is placed?()
A.A gatekeeper is contacted to determine the correct local gateway to use.
B.A gateway will receive the call and forward a call request to the local gatekeeper.
C.A gateway will receive the call and forward a call request to the gatekeeper on the other side of the WAN
D.A gatekeeper will receive the call and forward a call request to the remote gateway.
A.programming interface to external applications
B.FXS and FXO port negotiation
C.AutoQos VoIP trust boundaries
D.signaling and device control
E.LLO for voice and video traffic
F.directory and XML services
A.WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.
B.Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.
C.WRED will throttle back voice traffic only as a last resort.
D.If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.
E.WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.
F. WRED treats non-IP traffic as precedence 4.
A.SDMVoice
B.SDMSignal
C.SDMTrans
D.SDMManage
E.SDMRout
F.SDMBulk
A.Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B.Excess traffic is buffered so that the traffic remains within the desired rate.
C.Packets that conform to traffic policies are not delayed.
D.Packet marking is available and allows excess packets to be re-marked with a lower priorit
A.Queuing introduces equal delays for packets of the same flow, resulting in jitter.
B.When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.
C.All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.
D.There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.
E.In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.
F.Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping
A. If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.
B. The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.
C. With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.
D. With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
E. With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field
C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
E. The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Refer to the exhibit. Which two statements accurately describe the pictured WPA wireless LAN controller configuration?()
A.WPA1 is disabled and WPA2 is enabled.
B.WPA1 is enabled and WPA2 is disabled.
C.WPA1 is enabled and WPA2 is enabled.
D.TKIP is the default parameter for WPA1 andWPA2.
E.AES is the default parameter for WPA1 and WPA2.
F.The default WPA1 and WPA2 parameters are enabled
A.It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first
B.It fragments larger packets and allows VoIP packets to be transmitted in between them.
C.It stops the transmission of large packets when priority packets arrive.
D.It sends high priority packets in between normal traffic packets.
最新試題
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
Which Control Plane Policing (CoPP) statement is true?()
Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()
Which three functions are associated with a Cisco Unified CallManager? ()
What are three Cisco Unified CallManager features? ()
What are the three models of quality of service (QoS) in a network?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()