网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()
A
rate limit voice traffic
B
configure spanning-tree for fast link convergence
C
isolate voice traffic on separate VLANs
D
classify and mark traffic close to the source
参考答案
参考解析
解析:
暂无解析
更多 “多选题When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()Arate limit voice trafficBconfigure spanning-tree for fast link convergenceCisolate voice traffic on separate VLANsDclassify and mark traffic close to the source” 相关考题
考题
When troubleshooting an 802.11g network. Which of the following can interfere with the network?()
A. 2.4 GHz cordless phoneB. 900 MHz cordless phoneC. Bluetooth headsetD. Bluetooth printer
考题
Which of the following are advantages of using Dynamic Host Configuration Protocol?()
A. IP addresses can be managed from a central pointB. Computers can automatically get new addressing when moved to a different network segmentC. Media Access Control addresses can be changed automaticallyD. The network speed can automatically adjust based on the type of traffic being generatedE. The HOSTS file on the computer can be validated for proper entries
考题
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()
A.BusB.MeshC.MultipathD.Ring
考题
When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()
A. rate limit voice trafficB. configure spanning-tree for fast link convergenceC. isolate voice traffic on separate VLANsD. classify and mark traffic close to the source
考题
Which two states are the port states when RSTP has converged?()
A.blockingB.learningC.disabledD.forwardingE.listening
考题
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates
考题
You are the Cisco Network Designer. Which of these is least important when determining howmany users a NAS can support?()A、 bandwidthB、 number of plug-ins per scanC、 total number of network devicesD、 number of checks in each posture assessment
考题
When using Cisco Network Assistant to configure smartports, Which tow of the following roles can belong to a VLAN of the type "access" ?()A、Phone+DesktopB、DesktopC、SwitchD、RouterE、Trunk
考题
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwardingstate? ()A、redundantB、spannedC、provisionedD、converged
考题
Which two states are the port states when RSTP has converged?()A、blockingB、learningC、discardingD、forwardingE、listening
考题
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing
考题
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?()A、redundantB、spannedC、provisionedD、converged
考题
An integrated, converged network enables customers to accomplish which three actions?()A、 simplify communicationsB、 eliminate network security threatsC、 reduce total cost of ownershipD、 reduce headcountE、 enable collaborationF、 increase bandwidth
考题
When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring
考题
When troubleshooting an 802.11g network. Which of the following can interfere with the network?()A、2.4 GHz cordless phoneB、900 MHz cordless phoneC、Bluetooth headsetD、Bluetooth printer
考题
Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries
考题
多选题Which two statements are true about the application of QoS in a converged network?()Aend-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableBend-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableCend-to-end network delay is not a factor as long as the delay is consistentDsome packet loss can be corrected by codec algorithmsERSVP handles voice packet retransmissionFfragmentation is a result of packet loss
考题
多选题When using Cisco Network Assistant to configure smartports, Which tow of the following roles can belong to a VLAN of the type "access" ?()APhone+DesktopBDesktopCSwitchDRouterETrunk
考题
单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()A
Enable the highest level of Syslogging available to ensure you log all possible event messagesB
Use SSH to access your Syslog informationC
Log all messages to the system buffer so that they can be displayed when accessing the routerD
Syncronize clocks on the network with a protocol such as Network Time Protocol
考题
单选题When troubleshooting an 802.11g network. Which of the following can interfere with the network?()A
2.4 GHz cordless phoneB
900 MHz cordless phoneC
Bluetooth headsetD
Bluetooth printer
考题
单选题You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()A
bandwidthB
number of plug-ins per scanC
total number of network devicesD
number of checks in each posture assessment
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB
detailed security device specificationsC
results from pilot network testingD
results from a network audit
考题
多选题An integrated, converged network enables customers to accomplish which three actions?()Asimplify communicationsBeliminate network security threatsCreduce total cost of ownershipDreduce headcountEenable collaborationFincrease bandwidth
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
a list of applications currently in use in the networkB
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC
detailed security device specificationsD
results from pilot network testing
考题
多选题Which two states are the port states when RSTP has converged?()AblockingBlearningCdisabledDforwardingElistening
考题
多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization
热门标签
最新试卷