单项选择题For acceptable voice calls, the packet error rate should be no higher than what value?()

A.0.1%
B.1%
C.2.5%
D.25%


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which two of these are recommended practices with trunks?()

A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

2.多项选择题Which two design concerns must be addressed when designing a multicast implementation?()

A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

4.单项选择题You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?()

A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.

6.单项选择题Why is STP required when VLANs span access layer switches?()

A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology

8.单项选择题What is a virtual firewall?()

A.another name for a firewall deployed in routed mode
B.another name for a firewall deployed in transparent mode
C.a separation of multiple firewall security contexts on a single firewall
D.a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E.a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

9.多项选择题In which two locations in an enterprise network can an IPS sensor be placed?()

A.bridging VLANs on two switches
B.bridging two VLANs on one switch
C.between two Layer 2 devices with trunking
D.between two Layer 2 devices without trunking
E.between a Layer 2 device and a Layer 3 device with trunking

10.单项选择题In base e-Commerce module designs, where should firewall perimeters be placed?()

A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers

最新试题

What is the recommended practice when considering VPN termination and firewall placement?()

题型:单项选择题

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

题型:单项选择题

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

题型:单项选择题

Which three of these are important when determining NAS Server scaling? ()

题型:多项选择题

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

题型:单项选择题

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

题型:单项选择题

Which signal and noise values will result in the best phone communication with an access point?()

题型:单项选择题

What is the recommended radius of a cell for a voice-ready wireless network?()

题型:单项选择题

Which technology allows centralized storage services to be shared across different VSANs?()

题型:单项选择题

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

题型:单项选择题