单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()AprioritizationBclassificationCfragmentationDtraffic shaping

单选题
To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()
A

prioritization

B

classification

C

fragmentation

D

traffic shaping


参考解析

解析: 暂无解析

相关考题:

Which color does the router assign to packets received at a datarate that is above the committed rate but is below the peak rate?() A.redB.whiteC.greenD.yellow

To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?() A. prioritizationB. classificationC. fragmentationD. traffic shaping

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

Which two statements are true about voice packets in a LAN? (Choose two.)  ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

Which two statements are true about MLP interleaving? ()A、 It fragments and encapsulates all packets in a fragmentation header.B、 Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.C、 Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.D、 It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.

To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relaylink, what should be used in the CPE?()A、 prioritizationB、 classificationC、 fragmentationD、 traffic shaping

Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()A、 Packets can arrive out of order.B、 Packets must take the same path to the destination.C、 Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.D、 Packets can experience varying delays across the network.E、 Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  B、 Voice traffic data flow involves large volumes of large packets.  C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. E、 Voice packets are very sensitive to delay and jitter.

Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network

What are two major sources of delay that can be managed by QoS in voice-enabled networks?()A、propagation delayB、voice packet serialization delayC、congested egress queuesD、header overheadE、packets dropped because of CRC errors

Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems?()A、CBWFQB、LLQC、traffic shapingD、WRED

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()A、end-to-end delayB、interference from bulk data trafficC、processing delaysD、serialization delaysE、jitter

Which of the following is the BEST reason to label servers within the server room?()A、 To ensure server documentation is kept up to dateB、 To ensure administrators avoid duplicate server namesC、 To ensure server power requirements are metD、 To ensure the servers can be identified quickly and easily

You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()A、Packets within the 10.0.0.0/24 subnet will be accepted.B、Packets within the 10.0.0.0/24 subnet will be rejected.C、Packets within the 10.0.0.0/24 subnet will be counted.D、Packets within the 10.0.0.0/24 subnet will not be counted.

In your database, UNDO_RETENTION has been set to 600 sec and UNDO tablespace is configured for RETENTION GUARANTEE. Which statement regarding RETENTION GUARANTEE is true? ()A、Undo data is retained until the next full database backup.B、No committed undo data will be overwritten for 10 minutes.C、Committed undo data will be kept forever if not overwritten within 600 seconds.D、Guarantees that requested undo information are available until the instance is shut down.

单选题A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()Aend-to-end delayBinterference from bulk data trafficCprocessing delaysDserialization delaysEjitter

多选题Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()APackets can arrive out of order.BPackets must take the same path to the destination.COnce packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.DPackets can experience varying delays across the network.EPackets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

单选题Which color does the router assign to packets received at a datarate that is above the committed rate but is below the peak rate?()AredBwhiteCgreenDyellow

单选题Which of the following is the BEST reason to label servers within the server room?()A To ensure server documentation is kept up to dateB To ensure administrators avoid duplicate server namesC To ensure server power requirements are metD To ensure the servers can be identified quickly and easily

单选题In your database, UNDO_RETENTION has been set to 600 sec and UNDO tablespace is configured for RETENTION GUARANTEE. Which statement regarding RETENTION GUARANTEE is true? ()AUndo data is retained until the next full database backup.BNo committed undo data will be overwritten for 10 minutes.CCommitted undo data will be kept forever if not overwritten within 600 seconds.DGuarantees that requested undo information are available until the instance is shut down.

单选题Scientists should be kept _____ of the latest developments in their research areas.AinformBinformingCinformedDto inform

单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relaylink, what should be used in the CPE?()A prioritizationB classificationC fragmentationD traffic shaping

多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

单选题To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?()AprioritizationBclassificationCfragmentationDtraffic shaping

多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.BConfigure pNAT to ensure Voice over IP packets are properly translated.CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN. DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

单选题The responsibilities of the engineer officer in charge of the watch do not include ()Ato ensure the main propulsion plant are kept under constant surveillanceBto ensure the auxiliary systems are kept under constant surveillanceCto inspect the steering gear spaces at suitable intervalsDto inspect and overhaul the equipments in his charge