单选题Which statement is true about the distributed call control in a VoIP network?()Athe VoIP endpoints have the intelligence to set up and control callsBCall setup and control functionality is centralized in one call agent or clusterCCall setup and control resides in call agents that are distributed throughout the networkDEach VoIP device has separate call control, voice packetization, and transport mechanisms

单选题
Which statement is true about the distributed call control in a VoIP network?()
A

the VoIP endpoints have the intelligence to set up and control calls

B

Call setup and control functionality is centralized in one call agent or cluster

C

Call setup and control resides in call agents that are distributed throughout the network

D

Each VoIP device has separate call control, voice packetization, and transport mechanisms


参考解析

解析: 暂无解析

相关考题:

Which statement is true about the frequency of OSPF LSA transmissions?() A.AB.BC.CD.D

Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for call admission control within existing H.323 environments?() A. single site with centralized call processingB. single site with distributed call processingC. multisite with centralized call processingD. multisite with distributed call processing

Which statement about tunnel bow thrusters fitted to large vessels is TRUE ________.A.They are effective on most vessels at speeds up to 10 knotsB.Because of their location,most modern installations have as much power as a tugC.They are fully effective at all draftsD.When going astern at slow speed,they provide effective steering control

Which statement is true about a distributed call control environment and the processing of dialed digits from an IP phone?()A、The router that is directly connected to the IP phone will look up the called number in its call routing table.B、The router that is directly connected to the IP phone will inform its call agent when a service request is detected.C、When the IP phone is picked up,the IP phone initiates the service request.D、The directly connected router passes the collected digits to its call agent,and the call agent looks up in its call-routing table the called number.

Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for calladmission control within existing H.323 environments?()A、 single site with centralized call processingB、 single site with distributed call processingC、 multisite with centralized call processingD、 multisite with distributed call processing

Which statement is true about the routing table?()A、The routing table exists in the control plane only.B、The routing table exists in the control plane and in the forwarding plane.C、The routing table contains both active and inactive routes.D、The routing table is stored on compact flash.

Which statement is true about the routing table?()A、The routing table exists in the control plane onlyB、The routing table exists in the control plane and the forwarding planeC、The routing table contains both active and inactive routesD、The routing table is stored on compact flash

Which statement is true about vishing?()A、Influencing users to forward a call to a toll number (for example, a long distance or international number)B、Influencing users to provide personal information over a web pageC、Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number)D、Influencing users to provide personal information over the phone

Which statement is true about the distributed call control in a VoIP network?()A、the VoIP endpoints have the intelligence to set up and control callsB、Call setup and control functionality is centralized in one call agent or clusterC、Call setup and control resides in call agents that are distributed throughout the networkD、Each VoIP device has separate call control, voice packetization, and transport mechanisms

Which statement is true about IBGP routers? ()A、They must be fully meshedB、They can be in a different ASC、They must be directly connected

Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

Which statement describes the distributed call control model in VoIP networks?()A、The gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownB、The gateway voice-capable device has a local call routing table configured through a routing protocol.C、The gateway voice-capable device relies on a call agent to support call control.D、The gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for call admission control within existing H.323 environments?()A、single site with centralized call processingB、single site with distributed call processingC、multisite with centralized call processingD、multisite with distributed call processing

Which two statements are true about terms in a routing policy?()A、A then statement is mandatory in a termB、If a term does not contain a from statement, all routers matchC、If a term does not contain a from statement, the Junos OS will not commitD、A then statement is not mandatory in a term

Which statement is true about the forwarding table?()A、The forwarding table is stored in the control plane onlyB、The forwarding table is stored in the control plane and in the forewarding planeC、The forwarding table contains both active and inactive routesD、The forwarding table can contain only sigle next hop per destination

Which statement is TRUE about the CacheFactory class ?()A、 it is a topology agnostic way to access NamedCachesB、 it provides mechanisms to manage underlying remote data sourcesC、 both A and B are TRUED、Neither A nor B are TRUE

单选题Which IP telephony deployment model uses an H.225 Gatekeeper-Controlled trunk for calladmission control within existing H.323 environments?()A single site with centralized call processingB single site with distributed call processingC multisite with centralized call processingD multisite with distributed call processing

单选题Which statement is true about the forwarding table?()AThe forwarding table is stored in the control plane onlyBThe forwarding table is stored in the control plane and in the forewarding planeCThe forwarding table contains both active and inactive routesDThe forwarding table can contain only sigle next hop per destination

单选题Which statement is true about the routing table?()AThe routing table exists in the control plane onlyBThe routing table exists in the control plane and the forwarding planeCThe routing table contains both active and inactive routesDThe routing table is stored on compact flash

单选题Which statement is true about the routing table?()AThe routing table exists in the control plane only.BThe routing table exists in the control plane and in the forwarding plane.CThe routing table contains both active and inactive routes.DThe routing table is stored on compact flash.

单选题Which statement is true about the forwarding table?()AThe forwarding table is stored in the control plane only.BThe forwarding table is stored in the control plane and in the forwarding plane.CThe forwarding table contains both active and inactive routes.DThe forwarding table can contain only a single next hop per destination.

单选题Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()A CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.B CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.C CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.D In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.

单选题Which statement is true about IBGP routers? ()AThey must be fully meshedBThey can be in a different ASCThey must be directly connected

单选题Which statement is true about a distributed call control environment and the processing of dialed digits from an IP phone?()AThe router that is directly connected to the IP phone will look up the called number in its call routing table.BThe router that is directly connected to the IP phone will inform its call agent when a service request is detected.CWhen the IP phone is picked up,the IP phone initiates the service request.DThe directly connected router passes the collected digits to its call agent,and the call agent looks up in its call-routing table the called number.

单选题Which statement describes the distributed call control model in VoIP networks?()AThe gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownBThe gateway voice-capable device has a local call routing table configured through a routing protocol.CThe gateway voice-capable device relies on a call agent to support call control.DThe gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

多选题Which three statements are true about load-based Call Admission Control?()Agrants a VoWLAN client-initiated call based on the number of active clients associated to the accesspointBgrants a VoWLAN client-initiated call based on channel bandwidth capacityCuses the 802.11i specificationDuses 802.11 action framesErequires a WMM-enabled client