A.The use of a queuing method that will give VoIP traffic strict priority over other traffic
B.The use of RTP header compression for the VoIP traffic
C.The proper classification and marking of the traffic as close to the source as possible
D.The use of 802.1QinQ trunking for VoIP traffic
E.The use of WRED
您可能感興趣的試卷
你可能感興趣的試題
A.IP phones require inline power and must be in separate VLAN to receive inline power
B.IP telephony applications require prioritization over other traffic as they are more delaysensitive
C.IP phones can only receive IP addresses through DHCP if they are in separate VLAN
D.The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan
According to the information presented in the following exhibit, can you tell me the reason that thetrust state of interface FastEthernet 0/3 displays "not trusted"?()
A.The command mis qos needs to be turned on in global configuration mode
B.DSCP map needs to be configured for VOIP
C.ToS has not been configured
D.There is not a Cisco Phone attached to the interface
A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression
A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful
Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()
A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link
最新試題
cisco ios command to interface dialer 0
Which three statements accurately describe IOS Firewall configurations?()
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()