单项选择题Which statement is true about IP telephony calls?()

A. A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.
B. The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.
C. Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.
D. The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  

A. The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B. The voice VLAN feature is disabled by default.
C. The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
E. PortFast is automatically disabled when a voice VLAN is configured.
F. The default CoS value for incoming traffic is set to 0.

2.多项选择题Which three WLAN statements are true? (Choose three.) () 

A. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C. A dhoc mode allows mobile clients to connect directly without an intermediate AP
D. Another term for infrastructure mode is independent service set (IBSS)
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight  access point.
F. WLANs are designed to share the medium and can easily handle an increased demand of channel  contention.

3.单项选择题

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust  cos on the switch port that is connected to the IP phone?()

A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary. 
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.  
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set theCoS
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.

4.单项选择题

Refer to the exhibit. Which statement is true about a voice VLAN?()

A. Physically the voice network and the data network are separate.
B. The voice traffic will normally be on a different IP subnet than will the data traffic.
C. End user intervention is necessary to place the phone into the proper VLAN.
D. The same security policy should be implemented for both voice and data traffic.
E. The data VLAN must be configured as the native VLAN.

5.多项选择题Which two multicast protocol statements are true? (Choose two.)  ()

A. Dense mode multicast requires explicit join messages from their members.
B. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic.
C. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.  
D. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E. The primary use of sparse mode multicast is for test labs and router performance testing.

6.多项选择题Which three IP multicast group concepts are true? (Choose three.) ()

A. If a packet is sent to a multicast group address, all members of the multicast group will receive it
B. If a packet is sent to a multicast group address, the multicast frame contains the source multicast  address
C. A router does not have to be a member of a multicast group to receive multicast data.
D. A router does not have to be a member of a multicast group to send to the group.
E. A router must be a member of a multicast group to receive multicast data.
F. A router must be a member of a multicast group to send to the group.

7.多项选择题Which three IP multicast related statements are true? (Choose three.)  ()

A. Multicast addresses 224.0.1.0 through 238.255.255.255 are called globally scoped addresses. They are used to multicast data between organizations and across the Internet
B. The multicast address 224.0.0.1 is a globally scoped address that has been reserved for the Network  Time Protocol (NTP) by the IANA
C. Multicast addresses 239.0.0.0 through 239.255.255.255 are called limited scope addresses. They are  constrained to a local group or organization
D. Multicast addresses 224.0.0.5 and 224.0.0.6 are limited scoped addresses that have been reserved for  OSPF
E. Multicast addresses 224.0.0.0 through 224.0.0.255 are used for network protocols on local LAN segments. Because they are always transmitted with a Time to Live (TTL) of 1, they are never forwarded  by a router

8.多项选择题Which three IP multicast address related statements are true? (Choose three.) () 

A.Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted  with Time to Live (TTL) greater than 1.
B.Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.
C.Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and  IGMPv3.
D.Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1  and 238.1.1.1 could not be used together.
E.Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA
F.The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in  purpose to RFC 1918 private unicast addresses.

9.多项选择题

Refer to the exhibit. Which two statements are correct? (Choose two.)()

A. All six routes will be installed in the routing table.
B. Two routes will be installed in the routing table.
C. Four routes will be installed in the routing table.
D. All the routes were redistributed into BGP from an IGP.
E. All the routes were originated by BGP with the network command.

10.多项选择题

Refer to the exhibit. Which two statements are true about the partial configuration that is provided.  (Choose two.) ()

A. All the configured neighbors are in autonomous system 100.
B. The peer group shortens the IBGP configuration.
C. The peer group shortens the EBGP configuration.
D. Only the outgoing filters are applied to BGP updates.
E. Three AS-path filters are applied to each BGP neighbor.

最新试题

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

题型:单项选择题

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

题型:单项选择题

Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

题型:多项选择题

Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()

题型:单项选择题

If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?()

题型:单项选择题

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

题型:单项选择题

Which two Aironet enterprise solution statements are true?()

题型:多项选择题

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

题型:多项选择题

Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()

题型:多项选择题

Which two statements are true about network voice traffic? (Choose two.)()

题型:多项选择题