多项选择题Which two statements are true about network voice traffic? (Choose two.)()

A. Voice traffic is affected more by link speed than FTP traffic is.
B. Voice traffic is affected more by packet delays than FTP traffic is.
C. Voice streams involve larger packet sizes than most TCP network traffic involves.
D. Voice traffic is more sensitive to packet loss than TCP network traffic is.
E. Voice traffic requires QOS mechanisms only in heavily loaded network segments.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

A. The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.
B. LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.
C. LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.
D. LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

2.多项选择题Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

A. access point certification and software control
B. compression and Layer 3 address mapping
C. Layer 3 addressing and distribution
D. packet encapsulation, fragmentation, and formatting
E. SNMP monitoring services

3.单项选择题A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

A. probe request/response, authentication request/response, association request/response
B. association request/response, authentication request/response, probe request/response
C. probe request/response, association request/response, authentication request/response
D. association request/response, probe request/response, authentication request/response

4.多项选择题Which two statements are true about voice packets in a LAN? (Choose two.)  ()

A. Voice traffic data flow involves large volumes of large packets.
B. Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
C. Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
D. Voice packets are very sensitive to delay and jitter.
E. Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

5.单项选择题

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()

A. It indicates that the radio of the client adapter is disabled.
B. It indicates that the client adapter is not associated to an access point or another client. 
C. It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.
D. It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.
E. It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.
F. It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.

6.多项选择题Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  

A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter  and the access point, manage authentication to the wireless network, and enable data encryption.
B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a  time.
D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.

7.单项选择题

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.
B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.

8.多项选择题

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

A. A device is trusted if it correctly classifies packets.
B. A device is trusted if it correctly declassifies packets.
C. The outermost trusted devices represent the trust boundary.
D. Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.  
E. Network trust boundaries are automatically configured in IOS version 12.3 and later.
F. For scalability, classification should be done as close to the edge as possible.

9.单项选择题

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?()


 

A. Endpoint 1 is the only acceptable place to establish a trust boundary.
B. Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.
C. Endpoint 2 is the only acceptable place to establish a trust boundary.
D. Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.
E. Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.
F. Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to  establish a trust boundary.

最新试题

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()

题型:单项选择题

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

题型:单项选择题

Which two Aironet enterprise solution statements are true?()

题型:多项选择题

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

题型:单项选择题

A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

题型:单项选择题

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

题型:单项选择题

Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  

题型:多项选择题

Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()

题型:多项选择题

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

题型:多项选择题

Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

题型:单项选择题