多选题VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()AMis-routed packetsBExcess jitterCDelay of critical trafficDPacket loss due to congestionEData link layer broadcast stormsFFTP connections unsuccessful
多选题
VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()
A
Mis-routed packets
B
Excess jitter
C
Delay of critical traffic
D
Packet loss due to congestion
E
Data link layer broadcast storms
F
FTP connections unsuccessful
参考解析
解析:
暂无解析
相关考题:
●Network managers have long awaited practical voice-overIP(VOIP)solutions.VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network.And a VOIP solution implemented at a company's head-quarters with far-reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills,provided that solution delivers POTS-like voice(75)over the Internet.(71)A.complicated B.useful C.ease D.orderly(72)A.converging B.dividing C.combine D.bringing(73)A.get B.put C.save D.waste(74)A.cash B.money C.space D.time(75)A.qualtity B.quality C.volune D.speed
Network managers have long(140)practical voice-over-IP(VOIP)solutions. VOIP(141)ease network management and decreases costs by converging a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company's head-quarters with far-reaching branch offices can(142)tremendous amounts of(143)in long distance phone bills, provided that solution delivers POTS-like voice(144)over the Internet.A.awaitB.awaitedC.awaitingD.awaits
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises ease network management and decreases(66)by converging a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company's head-quarters with far-reaching branch offices can(67)tremendous amounts of money in long distance phone bills, provided that solution delivers POTS-like voice(68)over the Internet.VOIP gateways are designed to convert voice from the(69)domain to the circuit switched domain. VOIP solutions use a digital signal processor(DSP)to process the voice data, preparing the voice sample for transmission by compressing voice and removing jitter. The VOIP equipment must comply with the(70)H.323 standard defined by the International Telecommunication Union, or ITU.A.timeB.cashC.costsD.space
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company' s head -quarters with far -reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills, provided that solution delivers POTS -like voice(75)over the Internet.A.complicatedB.usefulC.easeD.orderly
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C、You should consider having the new server joined to an Active Directory domain.D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds
You need to troubleshoot some problems in the Company VOIP network associated with jitter. What is the cause of jitter? ()A、 Packet dropsB、 Transmitting too many small packetsC、 Variable queue delaysD、 CompressionE、 None of the other alternatives apply
Jitter is causing problems with the VOIP application in the Company network. What causes network jitter?()A、Variable queue delaysB、Packet dropsC、Transmitting too many small packetsD、Compression
VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()A、Mis-routed packetsB、Excess jitterC、Delay of critical trafficD、Packet loss due to congestionE、Data link layer broadcast stormsF、FTP connections unsuccessful
VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()A、Mis-routed packets B、Excess jitterC、Delay of critical trafficD、Packet loss due to congestionE、Data link layer broadcast stormsF、FTP connections unsuccessful
Which three are characteristics of voice traffic in the Company VOIP campus network?()A、TCP retransmitsB、UDP priorityC、BurstyD、Delay sensitiveE、GreedyF、Drop sensitive
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED - V). You nee d to prepare the MED - V server for cluster mode. What should you do?()A、Copy the ConfigurationServer folder to a network share.B、Add the Failover Clustering feature to the MED - V server.C、Add the Network Load Balancing (NLB) feature to the MED - V server.D、M igrate the MED - V server to a highly available virtual machine (HAVM).
While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value? ()A、 DTPB、 VTPC、 802.1QD、 ISLE、 None of the other alternatives apply
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
You are the network administrator for Company. Many of the employees in the sales department travel on a regular basis and needs to dial into the company network from their Windows 2000 Professional portable computers. Your company recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access to meet the requirements of the new security policy. Employees who travel report they can no longer initiate a dial-up connection. You need to give employees who travel the ability to dial in to the company network. What should you do? ()A、Configure the dial-up connection on all of the portable computers to use L2TP.B、Configure the dial-up connection on all of the portable computers to use MS-CHAP v2.C、Apply the Compatws.inf Security Template to all of the portable computers.D、Apply the Hisecws.inf Security Template to all of the portable computers.
单选题You need to troubleshoot some problems in the Company VOIP network associated with jitter. What is the cause of jitter? ()A Packet dropsB Transmitting too many small packetsC Variable queue delaysD CompressionE None of the other alternatives apply
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
单选题Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()A CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.B CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.C CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.D In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.
单选题VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A90 millisecondsB120 millisecondsC150 millisecondsD240 milliseconds
多选题Which three are characteristics of voice traffic in the Company VOIP campus network?()ATCP retransmitsBUDP priorityCBurstyDDelay sensitiveEGreedyFDrop sensitive
多选题The Cisco AutoQoS feature is being used throughout the Company VOIP network. Which three statements about this feature are true?()AThe mls qos global configuration command must be entered before configuring AutoQoS.BCEF must be enabled.CThe no auto qos voip command is used to disable Cisco AutoQos and revoke all configurations generated by Cisco AutoQos.DCDP must be enabled.ESNMP must be enabled.
单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()Adata marked with DSCP AF21,VOIP marked with DSCP EFBdata marked with DSCP AF51,VOIP marked with DSCP EFCdata marked with the DE-bit,VOIP marked with the CLP-bitDdata marked with DSCP EF,VOIP marked with DSCP AF31Edata marked with IP precedence 5 VOIP marked with DSCP EF
多选题VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()AMis-routed packetsBExcess jitterCDelay of critical trafficDPacket loss due to congestionEData link layer broadcast stormsFFTP connections unsuccessful