單項選擇題

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling.
Given these types of applications, how many different classes will need to be configured in QoS?()

A. 8
B. 6
C. 9
D. 5


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)

A. flags indicating the kind of autoconfiguration that can be done by hosts
B. default router information
C. /64 prefix that can be used on the link and the lifetime of the prefix
D. IPv6 DHCP server address information

4.單項選擇題As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()

A. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C. NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
D. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

5.單項選擇題As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()

A. It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B. It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C. It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D. It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.


最新試題

Refer to the exhibit. Which SSH sessions will the SSH server accept?()

題型:單項選擇題

You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()

題型:單項選擇題

Refer to the exhibit. Which two of these statements are correct? (Choose two.)()

題型:多項選擇題

Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()

題型:單項選擇題

As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()

題型:單項選擇題

When a Cisco router is configured for SSH, it acts as an ()?

題型:單項選擇題

Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

題型:多項選擇題

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

題型:多項選擇題

Refer to the exhibit. For the given configuration, on packets leaving the router on interface FastEthernet0/0 that matches the high traffic class, what will the MPLS experimental bit be set to?()

題型:單項選擇題

Refer to the exhibit. Which two of these events will be the result of issuing the above command? ()(Choose two.)

題型:多項選擇題