A. single site with centralized call processing
B. single site with distributed call processing
C. multisite with centralized call processing
D. multisite with distributed call processing
您可能感興趣的試卷
你可能感興趣的試題
A. QoS must be set to Platinum
B. WMM must be enabled
C. QoS must be set to Gold
D. TSPEC must be disabled
E. Cisco Compatible Extensions must be disabled
A. rate limit voice traffic
B. configure spanning-tree for fast link convergence
C. isolate voice traffic on separate VLANs
D. classify and mark traffic close to the source
DRAG DROP
A. reliability
B. scalability
C. redundancy
D. manageability
A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
最新試題
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which technology allows centralized storage services to be shared across different VSANs?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()