多选题Which two statements are true about the protocols that are used for transmitting voice traffic?()ARTP multiplexing is used to keep multiple phone conversations separateBRTP provides end-to-end delivery services for voice traffic.CUDP is used to ensure a reliable transmission from sender to receiver.DRTP is used to provide resource reservation for the voice stream.EUDP provides multiplexing of multiple phone conversations.
多选题
Which two statements are true about the protocols that are used for transmitting voice traffic?()
A
RTP multiplexing is used to keep multiple phone conversations separate
B
RTP provides end-to-end delivery services for voice traffic.
C
UDP is used to ensure a reliable transmission from sender to receiver.
D
RTP is used to provide resource reservation for the voice stream.
E
UDP provides multiplexing of multiple phone conversations.
参考解析
解析:
暂无解析
相关考题:
Which two statements are true about pool-based source NAT? ()(Choose two.) A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.
Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP
Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()A、 The VSS switch must be the root bridge for all VLANs and is automatically designatedB、 The VSS switch is defined in RFC 4318 as a managed objectC、 The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devicesD、 A VSS interoperates with a virtual port channelE、 The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devicesF、 A VSS increases the size of the spanning-tree domain
Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice trafficC、UDP is used to ensure a reliable transmission from sender to receiverD、RTP is used to provide resource reservation for the voice streamE、UDP provides multiplexing
Which two statements about VACLs on Cisco Nexus 7000 Series Switches are true? ()A、 A single VACL can be shared across two or more VDCs.B、 Use of VACLs requires no special license to be installed.C、 VACLs make use of IP or MAC ACLs.D、 Only options drop and forward are permitted.
Which two statements are true about IS -IS routing?()A、Based on the default timers, OSPF d etects a failure faster than IS - IS does.B、OSPF default timers permit more tuning than IS - IS does.C、IS - IS is more efficient than OSPF in the use of CPU resources.D、OSPF is more scalable than IS - IS because of its ability to identify normal, stub, an d NSSA areas.E、IS - IS and OSPF are both Open Standard, link - state routing protocols which support VLSM.
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
Which statement is true about routing tables on a Junos device?()A、They purge any routes not selected as active routes.B、They exist in two places: the Routing Engine and the Packet Forwarding Engine.C、They are exclusively designed to handle dynamic routing protocols.D、They populate the forwarding table.
Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.
Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards
Which two statements are true about the role of split horizon?()A、It is a function used by routing protocols to install routes into routing tableB、It is a function that prevents the advertising of routes over an interface that the router is usingto reach a routeC、Its function is to help avoid routing loops.D、It is a redistribution technique used by routing protocols
Which two statements about OSPF IPv6 routing are true?()A、It requires OSPF version 3.B、automatically detects neighbors over NHMA interfacesC、It supports encryption usingD、It uses LSA type 9E、It uses LSA type 8
Which two statements about VPLS are true? ()A、There is a full mesh of pseudowires.B、There is a partial mesh of pseudowires.C、Only L2TPv3 can be used for pseudowire establishment.D、There is split-horizon to avoid loops.
Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice traffic.C、UDP is used to ensure a reliable transmission from sender to receiver.D、RTP is used to provide resource reservation for the voice stream.E、UDP provides multiplexing of multiple phone conversations.
Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.
Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.
Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.
Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.
Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column levelC、Constraints can be created after the table is createdD、Constraints can be created at the same time the table is createdE、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
多选题Which two statements about route redistribution when implementing OSPF are true?()ARoutes learned using any IP routing protocol can only be redistributed into non IP routing protocols.BOSPF can import routes learned using EIGRP, RIP, and IS - IS.COSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.DAt the interdomain level, OSPF cannot import routes learned using BGP.EOSPF routes can be exported into BGP.
多选题By default, which two statements are true about export routing polices?()AExport polices can evaluate only active routesBExport polices can evaluate all routesCExport polices can be applied to the forwarding tableDExport polices can be applied to interfaces
多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP
多选题Which two statements are true about the role of split horizon?()AIt is a function used by routing protocols to install routes into routing tableBIt is a function that prevents the advertising of routes over an interface that the router is usingto reach a routeCIts function is to help avoid routing loops.DIt is a redistribution technique used by routing protocols
多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view
多选题Which two statements about SCSI are true? ()AThe bus is limited to 32 devicesBIt is a full duplex serial standardCIt is a half-duplex serial standardDIt allows up to 320 MB/s of shared channel bandwidth
多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.