A.5
B.15
C.25
D.35
E.45
F.55
您可能感興趣的試卷
你可能感興趣的試題
A.Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.
B.Use the service-policy command to attach a traffic flow to an interface on the router.
C.Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.
D.Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.
E.Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.
F.Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
A.Implementing DiffServ involves the configuration of RSVP.
B.Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
C.Implementing IntServ involves the utilization of RSVP.
D.Traffic should be classified and marked by the core network devices.
E.Traffic should be classified and marked as close to the edge of the network as possible.
A.CAC provides guaranteed voice quality on a link.
B.CAC artificially limits the number of concurrent voice calls.
C.CAC is used to control the amount of bandwidth that is taken by a call on a link.
D.CAC prevents oversubscription of WAN resources that is caused by too much voice traffic.
E.CAC allows an unlimited number of voice calls while severely restricting,if necessary,other forms of traffic.
F.CAC solves voice congestion problems by using QoS to give priority to UDP traffic.
A.To support fault and policy reporting,the WLSE requires a Wireless Control System (WCS).
B.When WLSE detects an AP failure,it automatically increases the power and cell coverage of nearbyAPs.
C.WLSE requires the 2700 location appliance to offer location tracking.
D.WLSE can locate rogue APs and automatically shut them down.
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template.
A.A TACACS+ server is required to implement 802.1x.
B.MIC protects against man-in-the-middle and replay attacks.
C.The 802.1x standard provides encryption services for wireless clients.
D.The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
E.The IEEE 802.11i specification uses RC4 as its encryption mechanism.
F.WPA requires TKIP and AES as encryption methods.
最新試題
Within the WMM policy, how many default QoS radio access categories are there?()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
What is the term that is used to describe the process of converting a signal from digital to analog?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()