多項(xiàng)選擇題Which two statements about the DiffServ QoS model are true?()

A.DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.
B.Network traffic is identified by class, and the level of service is chosen for each class.
C.The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.
D.RSVP enables the DiffServ model to provide end-to-end QoS.
E.The DiffServ model is more scalable than the IntServ model.
F.The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What form of AutoQoS is supported on Cisco Catalyst 2950 switches with the Enhanced Image?()

A.AutoQos Enterprise
B.AutoQoS Campus
C.AutoQoS VoIP
D.AutoQoS LAN

3.多項(xiàng)選擇題Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()

A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ

4.多項(xiàng)選擇題Which two steps are executed in the deployment of Cisco AutoQoS for Enterprise?()

A.The customer uses SNMP statistics to create the policy.
B.QoS policy templates are generated and installed on the interface.
C.RTP is used to generate the policy.
D.LLQ,cRTP,and LFI are used to automatically discover the policy.
E.The auto-generated policy is manually optimized before implementation.
F.Auto-discovery is used to determine what traffic is on the interface.

5.多項(xiàng)選擇題What are three security problems with Wi-Fi Protected Access (WPA)?()

A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.

最新試題

Which three functions are associated with a Cisco Unified CallManager? ()

題型:多項(xiàng)選擇題

Which two QoS classification and marking statements are true? ()

題型:多項(xiàng)選擇題

When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()

題型:多項(xiàng)選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項(xiàng)選擇題

What is the term that is used to describe the process of converting a signal from digital to analog?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the items stated is typically the most expensive method of improving QoS across WAN links?()

題型:?jiǎn)雾?xiàng)選擇題

Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()

題型:多項(xiàng)選擇題

Which two commands should be entered on a WLAN controller to remove any residual configuration?()

題型:?jiǎn)雾?xiàng)選擇題

Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()

題型:多項(xiàng)選擇題

What are three Cisco Unified CallManager features? ()

題型:多項(xiàng)選擇題