多选题VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()AMis-routed packetsBExcess jitterCDelay of critical trafficDPacket loss due to congestionEData link layer broadcast stormsFFTP connections unsuccessful
多选题
VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()
A
Mis-routed packets
B
Excess jitter
C
Delay of critical traffic
D
Packet loss due to congestion
E
Data link layer broadcast storms
F
FTP connections unsuccessful
参考解析
解析:
暂无解析
相关考题:
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises ease network management and decreases(66)by converging a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company's head-quarters with far-reaching branch offices can(67)tremendous amounts of money in long distance phone bills, provided that solution delivers POTS-like voice(68)over the Internet.VOIP gateways are designed to convert voice from the(69)domain to the circuit switched domain. VOIP solutions use a digital signal processor(DSP)to process the voice data, preparing the voice sample for transmission by compressing voice and removing jitter. The VOIP equipment must comply with the(70)H.323 standard defined by the International Telecommunication Union, or ITU.A.timeB.cashC.costsD.space
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company' s head -quarters with far -reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills, provided that solution delivers POTS -like voice(75)over the Internet.A.complicatedB.usefulC.easeD.orderly
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D
Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D
Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E
You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds
You need to troubleshoot some problems in the Company VOIP network associated with jitter. What is the cause of jitter? ()A、 Packet dropsB、 Transmitting too many small packetsC、 Variable queue delaysD、 CompressionE、 None of the other alternatives apply
VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()A、Mis-routed packets B、Excess jitterC、Delay of critical trafficD、Packet loss due to congestionE、Data link layer broadcast stormsF、FTP connections unsuccessful
Which QoS mechanisms can you use on a converged network to improve VoIP quality?()A、The use of a queuing method that will give VoIP traffic strict priority over other trafficB、The use of RTP header compression for the VoIP trafficC、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED
You need to configure port security on switch R1. Which two statements are true about this technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default. E、 Port security cannot be configured for ports supporting VoIP.
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A、MAC filteringB、PoEC、IP filteringD、802.1X
You are a network administrator for your company. All servers run Windows Server 2003. A network server named Server1 functions as the main file server. Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up. You need to ensure that open files are backed up successfully. What should you do? ()A、Enable volume shadow copies on the partitions that are being backed up.B、Disable volume shadow copies on the partitions that are being backed up.C、Select the Verify data after backup check box in the Advanced backup options of the backup job.D、Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01. What is the first thing you should do when assigning bandwidth to ABC_VT01?()A、You need to install a Hyper-V Virtual Switch on ABC_SR07.B、You need to install Integration Services on ABC_VT01.C、You need to remove the legacy network card and replace it with a new one.D、You need to install a second legacy network card on ABC_SR07.E、You need to create an external virtual network.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
单选题You need to troubleshoot some problems in the Company VOIP network associated with jitter. What is the cause of jitter? ()A Packet dropsB Transmitting too many small packetsC Variable queue delaysD CompressionE None of the other alternatives apply
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
多选题Which QoS mechanisms can you use on a converged network to improve VoIP quality?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP trafficCThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED
单选题A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()AMAC filteringBPoECIP filteringD802.1X
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP
单选题Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()A CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.B CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.C CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.D In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.
多选题VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()AMis-routed packetsBExcess jitterCDelay of critical trafficDPacket loss due to congestionEData link layer broadcast stormsFFTP connections unsuccessful
单选题VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A90 millisecondsB120 millisecondsC150 millisecondsD240 milliseconds
单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()Adata marked with DSCP AF21,VOIP marked with DSCP EFBdata marked with DSCP AF51,VOIP marked with DSCP EFCdata marked with the DE-bit. VOIP marked with the CLP-bitDdata marked with DSCP EF,VOIP marked with DSCP AF31Edata marked with IP precedence 5,VOIP marked with DSCP EF
单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()Adata marked with DSCP AF21,VOIP marked with DSCP EFBdata marked with DSCP AF51,VOIP marked with DSCP EFCdata marked with the DE-bit,VOIP marked with the CLP-bitDdata marked with DSCP EF,VOIP marked with DSCP AF31Edata marked with IP precedence 5 VOIP marked with DSCP EF