单选题What is the goal of QoS in a network? ()Aprevent packets from being droppedBincrease available bandwidthCreduce hardware errorsDprovide predictable network serviceEeliminate propagation delayFeliminate jitter and packet loss
单选题
What is the goal of QoS in a network? ()
A
prevent packets from being dropped
B
increase available bandwidth
C
reduce hardware errors
D
provide predictable network service
E
eliminate propagation delay
F
eliminate jitter and packet loss
参考解析
解析:
暂无解析
相关考题:
You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.You need to connect to the network projector.What are two possible ways to achieve this goal?()A.AB.BC.CD.D
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?() A.CentrexB.Packet encryptionC.Intelligent call routingD.QoS
What are three considerations when choosing the QoS model to deploy in a network? ()A、 the routing protocols being utilized in the networkB、 the applications utilizing the networkC、 the traffic destinationsD、 network addressing schemeE、 cost of implementationF、 the amount of the control needed of the resources
What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()A、 reduce complexityB、 reduced costs for all types of usersC、 packet inspection at wire speedD、 QoS to the desktopE、 LAN encryption services
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()A、CentrexB、Packet encryptionC、Intelligent call routingD、QoS
What are the three models of quality of service (QoS) in a network?()A、 Resource Reservation Protocol (RSVP)B、 first-in, first-out (FIFO)C、 best-effortD、 CBWFQE、 IntServF、 DiffServ
What is the goal of QoS in a network? ()A、prevent packets from being droppedB、increase available bandwidthC、reduce hardware errorsD、provide predictable network serviceE、eliminate propagation delayF、eliminate jitter and packet loss
If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()A、IPSec VPNB、QoS mechanismC、FirewallD、NATE、EIGRP routing protocolF、Static routing
Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
What is the goal of the borderless network architecture?()A、to provide users with A single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies with A way to extend their security and control over employees on the internet
What is the goal of the borderless network architecture?()A、to provide users withA single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies withA way to extend their security and control over employees on the internet
Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsB、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsC、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsD、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packetsE、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsF、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets
QoS refers to the ability of a network to provide improved service, over various underlying technologies, to select network traffic. Which two traits are inherent to QoS?()A、 reference to network ability to provide improved service to all network trafficB、 reduction in delay, jitter, and packet lossC、 equal handling of all packetsD、 support for real-time applicationsE、 best-effort actions
You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS. Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?()A、The phones are not sending traffic with the correct DSCP value.B、The Cisco CallManager is not marking the traffic correctly.C、This is most likely a bug on the CE routers.D、Your LAN QoS is incorrectly configured.
You need to determine where the trust boundaries will be in a new Company VOIP design. Which two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic. D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network. E、Trust boundaries define the firewall rules for QoS admission into a network.
Which three statements are true about the appliance of QoS models?()A、the DiffServ model requires applications to signal the network with QoS requirementsB、the DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addressesC、the DiffServ model requires RSVPD、the best effort model is suitable for applications such as file transfer and e-mailE、the IntServ model requires applications to signal the network with QoS requirementsF、the IntServ model model attempts to deliver a level of service based on the QoS specified by each packet
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()A、 AccountingB、 Analog and digital voiceC、 MobilityD、 SecurityE、 Routing and switchingF、 VLAN and QoS
You are configuring an ATM PVC to support a Bridged 1483 network.What should be applied to the atm pvc command to accomplish this goal?()A、aal5muxB、aal5snapC、aal5routeD、aal5bridge
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()A、To achieve the goal, the Connection should be set to None for the network interface card.B、To achieve the goal, the Microsoft Loopback Adapter should be installed.C、To achieve the goal, a new Virtual Network should be created.D、To achieve the goal, Internet Connection Sharing (ICS) should be enabled.
多选题What are the three models of quality of service (QoS) in a network?()AResource Reservation Protocol (RSVP)Bfirst-in, first-out (FIFO)Cbest-effortDCBWFQEIntServFDiffServ
多选题Which three statements are true about the appliance of QoS models?()Athe DiffServ model requires applications to signal the network with QoS requirementsBthe DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addressesCthe DiffServ model requires RSVPDthe best effort model is suitable for applications such as file transfer and e-mailEthe IntServ model requires applications to signal the network with QoS requirementsFthe IntServ model model attempts to deliver a level of service based on the QoS specified by each packet
多选题Which three practices are important to the implementation of a DiffServ QoS architecture?()ABecause services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.BTraffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.CTraffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.DTraffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.EBased upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.FQoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
多选题You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard. You need to connect to the network projector. What are two possible ways to achieve this goal?()AStart the Microsoft Windows Media Center Service Launcher service.BEnable the File and Printer Sharing Windows Firewall exception.CConnect your computer to the same subnet as the network projector.DType the IP address of the network projector in the Connect to a Network Projector wizard.
多选题You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()AAccountingBAnalog and digital voiceCMobilityDSecurityERouting and switchingFVLAN and QoS
单选题What is the goal of QoS in a network? ()Aprevent packets from being droppedBincrease available bandwidthCreduce hardware errorsDprovide predictable network serviceEeliminate propagation delayFeliminate jitter and packet loss
单选题You are configuring an ATM PVC to support a Bridged 1483 network.What should be applied to the atm pvc command to accomplish this goal?()Aaal5muxBaal5snapCaal5routeDaal5bridge
单选题What is the goal of the borderless network architecture?()Ato provide users with A single device that permits access to information anywhereBto provide users with the same productivity and access to information no matter where are or which device they useCto eliminate the need for border security and firewallsDto provide companies with A way to extend their security and control over employees on the internet