单选题VoIP bearer traffic is typically marked to which DSCP value?()Acs3Bcs7CefDaf41Eaf31F0(default)

单选题
VoIP bearer traffic is typically marked to which DSCP value?()
A

cs3

B

cs7

C

ef

D

af41

E

af31

F

0(default)


参考解析

解析: 暂无解析

相关考题:

In which two ways can you influence how downstream LSRs treat MPLS traffic?() A. Use an EXP rewrite table.B. Use a DSCP rewrite table.C. Statically assign a CoS value to an LDP-signaled LSP.D. Statically assign a CoS value to an RSVP-signaled LSP.

Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic  B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic

You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()A、Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.B、Use the service-policy command to attach a traffic flow to an interface on the router.C、Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.D、Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.E、Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.F、Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.

What is the typical marked DSCP value for a voice signaling packet in VoIP technology?()A、BEB、AF41C、AF21D、EFE、AF31

VoIP bearer traffic is typically marked to which DSCP value?()A、cs3B、cs7C、efD、af41E、af31F、0(default)

What is the typical marked DSCP value for a voice media packet in Voice over IP technology?()A、AF41B、AF31C、AF21D、BEE、EF

On the basis of the definitions of different services in various RFCs, traffic with Expedited Forwarding per-hop behavior should be marked as which of these?()A、IP ToS of 0xEFB、IP experimental ECNC、DSCP decimal 5D、Binary value of 101110

Which statement is NOT a key QoS recommended requirement for voice bearer traffic?()A、Voice traffic should be marked to DSCP EF per the QoS baseline and RFC3246.B、Voice traffic loss should be no more than 3%.C、One-way latency (mouth-to-ear) should be less than 150 msec.D、Average one way jitter should be targeted to less than 30 msec.E、21-320 Kbps of guaranteed priority bandwidth is required per call depending on sample rate,codec,and layer 2 overhead.

Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

Which QoS mechanisms can you use on a converged network to improve VoIP quality?()A、The use of a queuing method that will give VoIP traffic strict priority over other trafficB、The use of RTP header compression for the VoIP trafficC、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED

单选题What is the typical marked DSCP value for a voice signaling packet in VoIP technology?()ABEBAF41CAF21DEFEAF31

多选题In which two ways can you influence how downstream LSRs treat MPLS traffic?()AUse an EXP rewrite table.BUse a DSCP rewrite table.CStatically assign a CoS value to an LDP-signaled LSP.DStatically assign a CoS value to an RSVP-signaled LSP.

单选题What occurs on a Frame Relay network when the CIR is exceeded?()AAll TCP traffic is marked discard eligibleBAll UDP traffic is marked discard eligible and a BECN is sentCAll TCP traffic is marked discard eligible and a BECN is sentDAll traffic exceeding the CIR is marked discard eligible

多选题Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? ()(SelectTWO)ANTPBVNCCRTPDSIPETLS

单选题What is the typical marked DSCP value for a voice media packet in Voice over IP technology?()AAF41BAF31CAF21DBEEEF

多选题Which QoS mechanisms can you use on a converged network to improve VoIP quality?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP trafficCThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED

多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

单选题On the basis of the definitions of different services in various RFCs,traffic with Expedited Forwarding per-hop behavior should be marked as which of these?()AIP ToS of 0xEFBIP experimental ECNCDSCP decimal 5DBinary value of 101110

多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.

多选题You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office.  Which  three statements are true about the voice VLAN feature on this switch?()AThe default CoS value for incoming traffic is set up to 0.BThe CoS value is trusted for 802.1p or 802.1q tagged traffic.CPortFast is automatically disabled when a voice VLAN is configured.DThe voice VLAN feature is disabled by default.EThe IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.FWhen the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()Adata marked with DSCP AF21,VOIP marked with DSCP EFBdata marked with DSCP AF51,VOIP marked with DSCP EFCdata marked with the DE-bit. VOIP marked with the CLP-bitDdata marked with DSCP EF,VOIP marked with DSCP AF31Edata marked with IP precedence 5,VOIP marked with DSCP EF

单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()Adata marked with DSCP AF21,VOIP marked with DSCP EFBdata marked with DSCP AF51,VOIP marked with DSCP EFCdata marked with the DE-bit,VOIP marked with the CLP-bitDdata marked with DSCP EF,VOIP marked with DSCP AF31Edata marked with IP precedence 5 VOIP marked with DSCP EF

多选题In which two ways can you influence how downstream LSRs treat MPLS traffic?()AUse an EXP rewrite table.BUse a DSCP rewrite table.CStatically assign a CoS value to an LDP-signaled LSPDStatically assign a CoS value to an RSVP-signlated LSP

多选题Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP traffic.CThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED for the VoIP traffic