多項(xiàng)選擇題

You need to configure a new Cisco router to be installed in the Company VOIP network. 
Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()

A.switchport voice vlan vlan-id
B.mls qos trust device cisco-phone
C.switchport priority extend cos_value
D.mls qos trust cos
E.mls qos trust override cos


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

Refer to the exhibit. 
Which three statements are true about trust boundaries in the campus  network?()

A.Classification and markingoccur using 802.1ab QoS bits before reaching the trust boundary.  
B.A device is trusted if it correctly declassifies packets. 
C.A device is trusted if it correctly classifies packets.
D.Network trust boundaries are automatically configured in IOS version 12.3 and later.  
E.The outermost trusted devices represent the trust boundary.
F.For scalability, classification should be done as close to the edge as possible.

2.多項(xiàng)選擇題

Refer to the exhibit. 
Which two statements are true about the required switch configurations to  support a voice VLAN?()

A.CDP must be disabled on the switch port to prevent interference between CDP messages and  voice traffic.
B.Port security cannot be configured on a port that is configured for a voice vlan.
C.Static secure MAC addresses should be configured on voice vlan ports to prevent access by  devices other than IP phones.
D.CDP must be enabled on the switch port to allow configuration information to be passed to the  IP phone.
E.Portfast must be enabled on the switch port.
F.802.1x authentication cannot be configured on a port configured for a voice vlan.

3.單項(xiàng)選擇題

You have been tasked with setting a trust boundary on the Company network.
 What is the basic  function of this trust boundary?()

A. Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.
B. Trust boundaries are a point in the network where QoS functionality begins and ends.
C. Trust boundaries determine whether certain types of traffic can pass.
D. Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.
E. None of the other alternatives apply

5.多項(xiàng)選擇題

You need to determine where the trust boundaries will be in a new Company VOIP design. 
Which  two statements are true about these trust boundaries?()

A.Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,
B.Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.
C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  
D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  
E.Trust boundaries define the firewall rules for QoS admission into a network.

6.單項(xiàng)選擇題

Refer to the exhibit. Based upon the information that is given, 
how will voice traffic from the phone  and data traffic from the PC be handled by SW_1? ()

A.The switch port will perform marking for the ingress voice and data traffic by using the  defaultCoS value at the switch port.
B.The switch port will trust theCoS value of the ingress voice and data traffic that comes into the  switch port.
C.The switch port will trust theCoS value of the ingress voice traffic. Data traffic will be marked at  the switch port with the default CoS value.
D.The switch port will trust theCoS value of the ingress data traffic. Voice traffic will be marked at  the switch port with the default CoS value.

7.單項(xiàng)選擇題

The voice VLAN feature has been enabled on a new Company Catalyst switch port. 
What is the  effect of this? ()

A.The CoS is trusted for 802.1P or 802.1Q tagged traffic.
B.PortFast is disabled on the port.
C.Port Security is automatically enabled on a voice VLAN port.
D.Untagged traffic is sent according to the default CoS priority of the port.
E.None of the other alternatives apply

8.單項(xiàng)選擇題

Refer to the exhibit. 
Which statement is true about where trust boundaries should be established  in a network?()


A.Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable  place to establish a trust boundary.
B.Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable  places to establish a trust boundary.
C.Endpoint 2 is the only acceptable place to establish a trust boundary.  
D.Endpoint 1 is the only acceptable place to establish a trust boundary.
E.Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable  place to establish a trust boundary.
F.Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable  places to establish a trust boundary.

9.多項(xiàng)選擇題

You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. 
Which  three statements are true about the voice VLAN feature on this switch?()

A.The default CoS value for incoming traffic is set up to 0.
B.The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C.PortFast is automatically disabled when a voice VLAN is configured.
D.The voice VLAN feature is disabled by default.
E.The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F.When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

10.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A.Physically the voice network and the data network are separate.
B.The voice traffic will normally be on a different IP subnet than will the data traffic.
C.End user intervention is necessary to place the phone into the proper VLAN.
D.The same security policy should be implemented for both voice and data traffic.
E.The data VLAN must be configured as the native VLAN.

最新試題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:?jiǎn)雾?xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:?jiǎn)雾?xiàng)選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:?jiǎn)雾?xiàng)選擇題