单项选择题What is the term that is used to describe the process of converting a signal from digital to analog?()

A. packetization
B. quantization
C. decoding
D. sampling


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are two reasons to implement H·323 gatekeepers?()

A. to eliminate the need for VoIP gateways
B. to scale a VoIP installation with multiple gateways
C. to provide call admission control and limit the number of simultaneous calls on the network 
D. to meet the requirement to control H·323 gateways on a LAN
E. to accept call requests and reduce the load on the gateway

2.多项选择题What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()

A. codec
B. link speed
C. Layer 2 encapsulation
D. packet overhead (IP/UDP/RTP)
E. link delay
F. total number of simultaneous calls that are allowed

3.多项选择题What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.
B. Use WFQ, CBWFQ, and LLQ to compress the payload.
C. Give TCP packets priority over UDP packets.
D. Use control plane policing for cRTP queuing.
E. Use stacker and predictor to compress the payload.

4.多项选择题What are three Cisco Unified CallManager features? ()

A. programming interface to external applications
B. FXS and FXO port negotiation
C. AutoQos VoIP trust boundaries
D. signaling and device control
E. LLQ for voice and video traffic
F. directory and XML services

5.多项选择题What are two components of the QoS Integrated Services (IntServ) model?()

A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol

6.多项选择题In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? ()

A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)

9.多项选择题Which two statements about the open and shared key wireless-authentication methods are true? ()

A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

10.多项选择题What are two features of WCS wireless management? ()

A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement

最新试题