网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()
A
prioritization
B
classification
C
fragmentation
D
traffic shaping
参考答案
参考解析
解析:
暂无解析
更多 “单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()A prioritizationB classificationC fragmentationD traffic shaping” 相关考题
考题
Which color does the router assign to packets received at a datarate that is above the committed rate but is below the peak rate?()
A.redB.whiteC.greenD.yellow
考题
To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()
A. prioritizationB. classificationC. fragmentationD. traffic shaping
考题
Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
考题
Which two statements are true about voice packets in a LAN? (Choose two.) ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
考题
Which two statements are true about MLP interleaving? ()A、 It fragments and encapsulates all packets in a fragmentation header.B、 Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.C、 Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.D、 It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
考题
To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relaylink, what should be used in the CPE?()A、 prioritizationB、 classificationC、 fragmentationD、 traffic shaping
考题
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()A、 Packets can arrive out of order.B、 Packets must take the same path to the destination.C、 Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.D、 Packets can experience varying delays across the network.E、 Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.
考题
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication. B、 Voice traffic data flow involves large volumes of large packets. C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is. D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery. E、 Voice packets are very sensitive to delay and jitter.
考题
Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network
考题
What are two major sources of delay that can be managed by QoS in voice-enabled networks?()A、propagation delayB、voice packet serialization delayC、congested egress queuesD、header overheadE、packets dropped because of CRC errors
考题
Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems?()A、CBWFQB、LLQC、traffic shapingD、WRED
考题
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection
考题
A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()A、end-to-end delayB、interference from bulk data trafficC、processing delaysD、serialization delaysE、jitter
考题
Which of the following is the BEST reason to label servers within the server room?()A、 To ensure server documentation is kept up to dateB、 To ensure administrators avoid duplicate server namesC、 To ensure server power requirements are metD、 To ensure the servers can be identified quickly and easily
考题
You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()A、Packets within the 10.0.0.0/24 subnet will be accepted.B、Packets within the 10.0.0.0/24 subnet will be rejected.C、Packets within the 10.0.0.0/24 subnet will be counted.D、Packets within the 10.0.0.0/24 subnet will not be counted.
考题
In your database, UNDO_RETENTION has been set to 600 sec and UNDO tablespace is configured for RETENTION GUARANTEE. Which statement regarding RETENTION GUARANTEE is true? ()A、Undo data is retained until the next full database backup.B、No committed undo data will be overwritten for 10 minutes.C、Committed undo data will be kept forever if not overwritten within 600 seconds.D、Guarantees that requested undo information are available until the instance is shut down.
考题
单选题A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()A
end-to-end delayB
interference from bulk data trafficC
processing delaysD
serialization delaysE
jitter
考题
多选题Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()APackets can arrive out of order.BPackets must take the same path to the destination.COnce packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.DPackets can experience varying delays across the network.EPackets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.
考题
单选题Which color does the router assign to packets received at a datarate that is above the committed rate but is below the peak rate?()A
redB
whiteC
greenD
yellow
考题
单选题Which of the following is the BEST reason to label servers within the server room?()A
To ensure server documentation is kept up to dateB
To ensure administrators avoid duplicate server namesC
To ensure server power requirements are metD
To ensure the servers can be identified quickly and easily
考题
单选题In your database, UNDO_RETENTION has been set to 600 sec and UNDO tablespace is configured for RETENTION GUARANTEE. Which statement regarding RETENTION GUARANTEE is true? ()A
Undo data is retained until the next full database backup.B
No committed undo data will be overwritten for 10 minutes.C
Committed undo data will be kept forever if not overwritten within 600 seconds.D
Guarantees that requested undo information are available until the instance is shut down.
考题
单选题Scientists should be kept _____ of the latest developments in their research areas.A
informB
informingC
informedD
to inform
考题
单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relaylink, what should be used in the CPE?()A
prioritizationB
classificationC
fragmentationD
traffic shaping
考题
多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
考题
单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()A
prioritizationB
classificationC
fragmentationD
traffic shaping
考题
多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection
考题
单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()A
Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.B
Configure pNAT to ensure Voice over IP packets are properly translated.C
Configure IOS firewall to permit RTP port numbers through the firewall via VPN. D
Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
考题
单选题The responsibilities of the engineer officer in charge of the watch do not include ()A
to ensure the main propulsion plant are kept under constant surveillanceB
to ensure the auxiliary systems are kept under constant surveillanceC
to inspect the steering gear spaces at suitable intervalsD
to inspect and overhaul the equipments in his charge
热门标签
最新试卷