单选题If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()AIPSec VPNBQoS mechanismCFirewallDNATEEIGRP routing protocolFStatic routing

单选题
If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()
A

IPSec VPN

B

QoS mechanism

C

Firewall

D

NAT

E

EIGRP routing protocol

F

Static routing


参考解析

解析: 暂无解析

相关考题:

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

Which two statements are true about voice packets in a LAN? (Choose two.)  ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

In Frame Relay, FECN messages indicating congestion are sent or received by which of following?()A、Sent by the destinationB、Received by the senderC、Received by the destinationD、Sent by the sender

What does the interface subcommand switchport voice vlan 222 indicate?()A、The port is configured for both data and voice traffic.B、The port is fully dedicated to forwarding voice traffic.C、The port will operate as an FXS telephony port.D、Voice traffic will be redirected to VLAN 222.

You have configured voice VLANs on Catalyst switch R1.  Which two statements are true about the  operation of voice VLANs on this device? ()A、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port.B、 Enabling voice VLANs enables the switch to create multiple queues for traffic that is entering a  port.C、 When voice VLANs are configured on a trunk link, UplinkFast must also be enabled.D、 Voice VLANs are configured to enable the switch to forward frames marked with the proper  CoS values over separate physical links.E、 Enabling voice VLANs enables the switch to forward frames with a specific 802.1P marking.

Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  B、 Voice traffic data flow involves large volumes of large packets.  C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. E、 Voice packets are very sensitive to delay and jitter.

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above

If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()A、IPSec VPNB、QoS mechanismC、FirewallD、NATE、EIGRP routing protocolF、Static routing

Which two statements are correct regarding multicast implementation using a WLAN controller (v5.2) and AP?()A、Multicast traffic is sent out on Cisco APs at the highest mandatory data rate.B、Multicast traffic is sent out on Cisco APs at the highest supported data rate.C、On Cisco APs, multicast traffic and beacons are sent out at the same data rates to maintain a common cell size for normal data as well as multicast data.D、If there is more than one mandatory data rate, multicast traffic will be sent at the highest mandatory rate and beacons will be sent at the lowest mandatory rate.E、On Cisco APs, multicast traffic will be sent out at the highest data rate that a client can maintain with the AP.

Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  A、 The CoS value is trusted for 802.1p or 802.1q tagged traffic.B、 The voice VLAN feature is disabled by default.C、 The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.D、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.E、 PortFast is automatically disabled when a voice VLAN is configured.F、 The default CoS value for incoming traffic is set to 0.

Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.

What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()A、A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.B、ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.C、A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead. D、IPSec requires additional overhead for the header and hash. E、ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.

Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing

单选题What does the interface subcommand switchport voice vlan 222 indicate?()AThe port is configured for both data and voice traffic.BThe port is fully dedicated to forwarding voice traffic.CThe port will operate as an FXS telephony port.DVoice traffic will be redirected to VLAN 222.

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

多选题VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()AVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.BVoice traffic data flow involves large volumes of large packets.CBecause a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.DVoice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.EVoice packets are very sensitive to delay and jitter.

多选题You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office.  Which  three statements are true about the voice VLAN feature on this switch?()AThe default CoS value for incoming traffic is set up to 0.BThe CoS value is trusted for 802.1p or 802.1q tagged traffic.CPortFast is automatically disabled when a voice VLAN is configured.DThe voice VLAN feature is disabled by default.EThe IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.FWhen the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

多选题Which two statements are true about voice packets in a LAN? (Choose two.)  ()AVoice traffic data flow involves large volumes of large packets.BBecause a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.CVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.DVoice packets are very sensitive to delay and jitter.EVoice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above

单选题Which statement is true about voice VLANs? ()AWhen the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.BThe voice VLAN feature is enabled by default.CThe IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.DThe default CoS value is 1 for incoming voice and data traffic.