A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol
您可能感興趣的試卷
你可能感興趣的試題
A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)
A. Gatekeeper multizone
B. Call Admission Control (CAC)
C. Automatic Alternate Routing (AAR)
D. Survivable Remote Site Telephony (SRST)
E. Cisco Unified CallManager Express (CME)
A. 55%
B. 58%
C. 60%
D. 63%
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. centralized management that requires an external AAA server
D. centralized management with integrated AAA server
E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days
A. involution
B. encoding
C. sampling
D. quantization
E. compression
F. companding
A. Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
B. Latency requirements are less stringent for video traffic than for voice traffic.
C. Video traffic is less sensitive to dropped packets than for voice traffic.
D. Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
E. Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
F. Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.
A. Determine a minimum bandwidth guarantee.
B. Determine interfaces to which to apply policy.
C. Assign priorities to the class.
D. Configure access control lists.
A. the routing protocols being utilized in the network
B. the applications utilizing the network
C. the traffic destinations
D. network addressing scheme
E. cost of implementation
F. the amount of the control needed of the resources
最新試題
What are two reasons to implement H·323 gatekeepers?()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
What is the term that is used to describe the process of converting a signal from digital to analog?()
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()