A. packetization
B. quantization
C. decoding
D. sampling
您可能感兴趣的试卷
你可能感兴趣的试题
A. to eliminate the need for VoIP gateways
B. to scale a VoIP installation with multiple gateways
C. to provide call admission control and limit the number of simultaneous calls on the network
D. to meet the requirement to control H·323 gateways on a LAN
E. to accept call requests and reduce the load on the gateway
A. codec
B. link speed
C. Layer 2 encapsulation
D. packet overhead (IP/UDP/RTP)
E. link delay
F. total number of simultaneous calls that are allowed
A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.
B. Use WFQ, CBWFQ, and LLQ to compress the payload.
C. Give TCP packets priority over UDP packets.
D. Use control plane policing for cRTP queuing.
E. Use stacker and predictor to compress the payload.
A. programming interface to external applications
B. FXS and FXO port negotiation
C. AutoQos VoIP trust boundaries
D. signaling and device control
E. LLQ for voice and video traffic
F. directory and XML services
A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol
A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)
A. Gatekeeper multizone
B. Call Admission Control (CAC)
C. Automatic Alternate Routing (AAR)
D. Survivable Remote Site Telephony (SRST)
E. Cisco Unified CallManager Express (CME)
A. 55%
B. 58%
C. 60%
D. 63%
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement
最新试题
What is an advantage of the IntServ QoS model?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
Within the WMM policy, how many default QoS radio access categories are there?()
What are the three models of quality of service (QoS) in a network?()
Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
Which two QoS classification and marking statements are true? ()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()