多項(xiàng)選擇題

You need to determine where the trust boundaries will be in a new Company VOIP design. 
Which  two statements are true about these trust boundaries?()

A.Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,
B.Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.
C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  
D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  
E.Trust boundaries define the firewall rules for QoS admission into a network.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. Based upon the information that is given, 
how will voice traffic from the phone  and data traffic from the PC be handled by SW_1? ()

A.The switch port will perform marking for the ingress voice and data traffic by using the  defaultCoS value at the switch port.
B.The switch port will trust theCoS value of the ingress voice and data traffic that comes into the  switch port.
C.The switch port will trust theCoS value of the ingress voice traffic. Data traffic will be marked at  the switch port with the default CoS value.
D.The switch port will trust theCoS value of the ingress data traffic. Voice traffic will be marked at  the switch port with the default CoS value.

2.單項(xiàng)選擇題

The voice VLAN feature has been enabled on a new Company Catalyst switch port. 
What is the  effect of this? ()

A.The CoS is trusted for 802.1P or 802.1Q tagged traffic.
B.PortFast is disabled on the port.
C.Port Security is automatically enabled on a voice VLAN port.
D.Untagged traffic is sent according to the default CoS priority of the port.
E.None of the other alternatives apply

3.單項(xiàng)選擇題

Refer to the exhibit. 
Which statement is true about where trust boundaries should be established  in a network?()


A.Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable  place to establish a trust boundary.
B.Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable  places to establish a trust boundary.
C.Endpoint 2 is the only acceptable place to establish a trust boundary.  
D.Endpoint 1 is the only acceptable place to establish a trust boundary.
E.Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable  place to establish a trust boundary.
F.Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable  places to establish a trust boundary.

4.多項(xiàng)選擇題

You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. 
Which  three statements are true about the voice VLAN feature on this switch?()

A.The default CoS value for incoming traffic is set up to 0.
B.The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C.PortFast is automatically disabled when a voice VLAN is configured.
D.The voice VLAN feature is disabled by default.
E.The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F.When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

5.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A.Physically the voice network and the data network are separate.
B.The voice traffic will normally be on a different IP subnet than will the data traffic.
C.End user intervention is necessary to place the phone into the proper VLAN.
D.The same security policy should be implemented for both voice and data traffic.
E.The data VLAN must be configured as the native VLAN.

最新試題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項(xiàng)選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about RSTP port roles?()

題型:?jiǎn)雾?xiàng)選擇題