A.4
B.6
C.-67
D.10
您可能感興趣的試卷
你可能感興趣的試題
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features
最新試題
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which signal and noise values will result in the best phone communication with an access point?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()