多选题Which two statements are true about the application of QoS in a converged network?()Aend-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableBend-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableCend-to-end network delay is not a factor as long as the delay is consistentDsome packet loss can be corrected by codec algorithmsERSVP handles voice packet retransmissionFfragmentation is a result of packet loss
多选题
Which two statements are true about the application of QoS in a converged network?()
A
end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
B
end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
C
end-to-end network delay is not a factor as long as the delay is consistent
D
some packet loss can be corrected by codec algorithms
E
RSVP handles voice packet retransmission
F
fragmentation is a result of packet loss
参考解析
解析:
暂无解析
相关考题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS
Which two QoS classification and marking statements are true? ()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which two QoS classification and marking statements are true?()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldC、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()A、 The SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.B、 The SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.C、 The SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.D、 The SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.E、 The SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.F、 The SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()A、 Business-critical traffic will be sorted into two QoS classes.B、 Real-time traffic will be sorted into one QoS class.C、 Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.D、 All traffic except real-time will be considered best-effort.E、 Routing, management, and transactional traffic will be considered business-critical.F、 Voice and call signaling traffic will be considered real-time.
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication. B、 Voice traffic data flow involves large volumes of large packets. C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is. D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery. E、 Voice packets are very sensitive to delay and jitter.
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
Which two statements are true about the application of QoS in a converged network?()A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableB、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableC、end-to-end network delay is not a factor as long as the delay is consistentD、some packet loss can be corrected by codec algorithmsE、RSVP handles voice packet retransmissionF、fragmentation is a result of packet loss
Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsB、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsC、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsD、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packetsE、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsF、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets
Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.
QoS refers to the ability of a network to provide improved service, over various underlying technologies, to select network traffic. Which two traits are inherent to QoS?()A、 reference to network ability to provide improved service to all network trafficB、 reduction in delay, jitter, and packet lossC、 equal handling of all packetsD、 support for real-time applicationsE、 best-effort actions
Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.
Which three characteristics are true about voice traffic in the campus network? ()A、TCP retransmitsB、benignC、greedyD、drop sensitiveE、smoothF、delay insensitive
You need to determine where the trust boundaries will be in a new Company VOIP design. Which two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic. D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network. E、Trust boundaries define the firewall rules for QoS admission into a network.
Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.
多选题Which two statements are true about the application of QoS in a converged network?()Aend-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableBend-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableCend-to-end network delay is not a factor as long as the delay is consistentDsome packet loss can be corrected by codec algorithmsERSVP handles voice packet retransmissionFfragmentation is a result of packet loss
多选题Which two statements are true about network voice traffic? (Choose two.)()AVoice traffic is affected more by link speed than FTP traffic is.BVoice traffic is affected more by packet delays than FTP traffic is.CVoice streams involve larger packet sizes than most TCP network traffic involves.DVoice traffic is more sensitive to packet loss than TCP network traffic is.EVoice traffic requires QOS mechanisms only in heavily loaded network segments.
多选题Which three statements about end-to-end delay are true? ()AEnd-to-end delay is the sum of propagation delays, processing delays, serialization delays, and queuing delays.BCoast-to-coast end-to-end delay over an optical link is about 20 ms.CProcessing delay depends on various factors, which include CPU speed, CPU utilization, IP switching mode, and router architecture.DPropagation and serialization delays are related to the media.EPropagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).FSerialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.
多选题Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()Athe SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsBthe SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsCthe SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsDthe SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packetsEthe SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsFthe SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets
多选题VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()AVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.BVoice traffic data flow involves large volumes of large packets.CBecause a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.DVoice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.EVoice packets are very sensitive to delay and jitter.
多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.
多选题QoS refers to the ability of a network to provide improved service, over various underlying technologies, to select network traffic. Which two traits are inherent to QoS?()Areference to network ability to provide improved service to all network trafficBreduction in delay, jitter, and packet lossCequal handling of all packetsDsupport for real-time applicationsEbest-effort actions
多选题Which two QoS classification and marking statements are true? ()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.CIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
多选题Which two QoS classification and marking statements are true?()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldCIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
多选题Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()AThe SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.BThe SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.CThe SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.DThe SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.EThe SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.FThe SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.
多选题You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()AICMPBSNMPCTCPDHTTPS
多选题The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()ABusiness-critical traffic will be sorted into two QoS classes.BReal-time traffic will be sorted into one QoS class.CVoice traffic will be considered real-time traffic while call signaling will be considered business-critical.DAll traffic except real-time will be considered best-effort.ERouting, management, and transactional traffic will be considered business-critical.FVoice and call signaling traffic will be considered real-time.
多选题You need to determine where the trust boundaries will be in a new Company VOIP design. Which two statements are true about these trust boundaries?()ATrust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings,BSetting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.CTrust boundaries are used to determine which QoS mechanism will be applied to the traffic.DAt the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network.ETrust boundaries define the firewall rules for QoS admission into a network.