多项选择题Which two statements are true about the various methods of implementing QoS?()

A.Cisco AutoQoS can be used repeatedly to apply a single QoS policy to multiple interfaces.
B.Cisco AutoQoS includes an optional web-based GUI for automating the configuration of QoS services.
C.Cisco AutoQoS provides capabilities to automate VoIP deployments.
D.The auto qos global configuration command is used to configure Cisco AutoQoS.
E.The Modular QoS CLI (MQC) is the best way to fine tune QoS configurations.
F.The SDM QoS wizard is the fastest way to implement QoS.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which two statements about the DiffServ QoS model are true?()

A.DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.
B.Network traffic is identified by class, and the level of service is chosen for each class.
C.The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.
D.RSVP enables the DiffServ model to provide end-to-end QoS.
E.The DiffServ model is more scalable than the IntServ model.
F.The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.

2.单项选择题What form of AutoQoS is supported on Cisco Catalyst 2950 switches with the Enhanced Image?()

A.AutoQos Enterprise
B.AutoQoS Campus
C.AutoQoS VoIP
D.AutoQoS LAN

5.多项选择题Which two steps are executed in the deployment of Cisco AutoQoS for Enterprise?()

A.The customer uses SNMP statistics to create the policy.
B.QoS policy templates are generated and installed on the interface.
C.RTP is used to generate the policy.
D.LLQ,cRTP,and LFI are used to automatically discover the policy.
E.The auto-generated policy is manually optimized before implementation.
F.Auto-discovery is used to determine what traffic is on the interface.

6.多项选择题What are three security problems with Wi-Fi Protected Access (WPA)?()

A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.

8.多项选择题Which three statements about end-to-end delay are true?()

A.End-to-end delay is the sum of propagation delays,processing delays,serialization delays,and queuing delays.
B.Coast-to-coast end-to-end delay over an optical link is about 20 ms.
C.Processing delay depends on various factors,which include CPU speed,CPU utilization,IP switching mode, and router architecture.
D.Propagation and serialization delays are related to the media.
E.Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).
F.Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.

9.多项选择题To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used?()

A.class-based weighted fair queuing (CBWFQ)
B.low latency queuing (LLQ)
C.priority queuing (PQ) or custom queuing (CQ)
D.Real-Time Transport Protocol (RTP) header compression
E.TCP header compression
F.UDP header compression

10.多项选择题

Refer to the exhibit. Both routers have been configured as VoIP gateways. They must also support traditional telephony devices to connect to analog telephones. Which two configuration changes would correctly support the voice requirements?()

A.On each router, under the dial-peer voice 1 pots configuration, add the port fa0/0 command.
B.On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/0 command.
C.On each router, configure dial-peer voice 1 as a voip connection and configure dial-peer voice 2 as a pots connection.
D.Under the dial-peer voice 1 pots configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
E.Under the dial-peer voice 2 voip configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
F.Under the dial-peer voice 2 voip configuration, change the destination target address of 10.2.2.2 to 10.1.1.1 on the R1 router, and the destination target address of 10.1.1.1 to 10.2.2.2 on the R2 router.

最新试题

Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()

题型:单项选择题

SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()

题型:多项选择题

Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()

题型:单项选择题

In the design of a QoS solution, which two factors should be taken into consideration?()

题型:多项选择题

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

题型:单项选择题

Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()

题型:单项选择题

What is an advantage of the IntServ QoS model?()

题型:单项选择题

In a VoIP network, which type of interface would an analog fax machine connect to?()

题型:单项选择题

What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

题型:多项选择题

Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()

题型:多项选择题