You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()A. DSCP AF21B. DSCP CS4C. DSCP AF33D. DSCP AF13

You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()

A. DSCP AF21

B. DSCP CS4

C. DSCP AF33

D. DSCP AF13


相关考题:

All traffic, be it e-mail or streaming video, travels via a method called packet switching, (97)parcels out digital data into small chunks, or packets, and sends them over a network shared bycountless users.A.soB.whichC.andD.who

Which IP telephony component provides call processing, such as signaling, that in a traditional voice network is provided by switching equipment, such as a PBX?() A.Advanced call-handling software, such as Cisco UnityB.Call-management hardware and software, such as CiscoCallManagerC.Client-based software, such as CiscoSoftPhoneD.Voice gateways, such as the Cisco VG248 Analog Phone Gateway

【A popular service that has attercted the interest of companies and has home users alike is the sending of voice signals over an IP-based network, such as the Internet. The practice of making telephone calls over the internet has had a number of different names, including packet voice, voice over packet, voice over the internet, internet telephone, and Voice over Ip(Voip). But it appears the industry has settled on the termVoice ove IP in reference to the internet protocol, which controls the transfer of data over the internet. There are currently three ways to deliver VoIp to users, the first technique is found at the corporate level. Many companies are offering VoIP systerms that operate over a local area network. These systems involve a fair amount of equipment, such as VoIP servers, special IP-enabled telephones, and routers that can direct telephone calls. Today a large portion of corporate sites have converted their older internal telephone systems to VoIP systems that opreate over a LAN, thus converging two systems into one. A second common solution is the one often encountered at home. Using existing telephones, a special converter is added between the telephone and a high speed internet(DSL or cable modem)connection. The converter digitizes the voice signal and creates a stream of packets that are then sent over an ip connection.The third technique involves smart cell phones. Never cell technologies are all packet-based, thus requiring a telephone call to be converted to digital packets and sending those packets over IP networks.】From the paragraph above,a popular service that has attracetd the interest of companies and home users,is termed as () . The data transfer over the Internet is controlled by the () . At corporate level, many companies have replaced their older internal telephone systerms with () that oprerate over a local area network.A、voice over the internet B、voice over packet C、Voice over IP D、internet telephony A、packet B、internet protocol C、industry D、VoIp servers A、VoIP systems B、IP-enablde telephones C、VoIP servers D、routers

Which IP telephony component provides call processing, such as signaling, that in a traditional voice network is provided by switching equipment, such as a PBX?()A、Advanced call-handling software, such as Cisco UnityB、Call-management hardware and software, such as CiscoCallManagerC、Client-based software, such as CiscoSoftPhoneD、Voice gateways, such as the Cisco VG248 Analog Phone Gateway

Which statement is true about the comparison of voice traffic with video traffic?()A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B、 Latency requirements are less stringent for video traffic than for voice traffic.C、 Video traffic is less sensitive to dropped packets than for voice traffic.D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()A、IP phones require inline power and must be in separate VLAN to receive inline powerB、IP telephony applications require prioritization over other traffic as they are more delaysensitiveC、IP phones can only receive IP addresses through DHCP if they are in separate VLAND、The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan

Which Internet Protocol(IP) telephony element is best categorizedas a voice application component?()A、IP telephoneB、Voice gatewayC、Private branch exchange (PBX)D、Advanced audio conferencing software

Which statement is true about the comparison of voice traffic with video traffic?()A、video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsB、latency requirements are less stringent for video traffic than for voice trafficC、video traffic is less sensitive to dropped packets than for voice trafficD、video traffic requires the retransmission capabilities of TCP whereas voice uses UDPE、video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsF、voice traffic requires the retransmission capabilities of TCP whereas video uses UDP

Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.

You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic. If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()A、DSCP AF21B、DSCP CS4C、DSCP AF33D、DSCP AF13

Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsB、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsC、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsD、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and  network management packetsE、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsF、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets

What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?()A、VTPB、802.1 qC、CDPD、Skinny Station Protocol

Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A、8B、6C、9D、5

A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()A、Configure traffic shaping to reduce the bandwidth available to the file sharing application.B、Configure a separate VLAN for the IP phones.C、Install a content caching proxy at the branch to reduce inbound WAN traffic.D、Upgrade switches to provide higher bandwidth ports for workstations and IP phones.

单选题What is a benefit of Internet protocol (IP) telephony?()ASynchronizes password exchanges for call setupBEliminates the need for physical cabling in a TCP/IP networkCEnables two-way voice transmission over a packet-switched TCP/IP networkDCreates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network

多选题Which statement is true about the comparison of voice traffic with video traffic?()Avideo conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsBlatency requirements are less stringent for video traffic than for voice trafficCvideo traffic is less sensitive to dropped packets than for voice trafficDvideo traffic requires the retransmission capabilities of TCP whereas voice uses UDPEvideo traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsFvoice traffic requires the retransmission capabilities of TCP whereas video uses UDP

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

单选题You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()AIP phones require inline power and must be in separate VLAN to receive inline powerBIP telephony applications require prioritization over other traffic as they are more delaysensitiveCIP phones can only receive IP addresses through DHCP if they are in separate VLANDThe CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan

多选题Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()AThe SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.BThe SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.CThe SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.DThe SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.EThe SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.FThe SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.

单选题Which statement is true about the comparison of voice traffic with video traffic?()A Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B Latency requirements are less stringent for video traffic than for voice traffic.C Video traffic is less sensitive to dropped packets than for voice traffic.D Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

单选题Which statement is true about IP telephony calls?()A A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.B The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.C Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.D The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.BConfigure pNAT to ensure Voice over IP packets are properly translated.CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN. DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

单选题Which statement is true about voice VLANs? ()AWhen the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.BThe voice VLAN feature is enabled by default.CThe IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.DThe default CoS value is 1 for incoming voice and data traffic.