A. programming interface to external applications
B. FXS and FXO port negotiation
C. AutoQos VoIP trust boundaries
D. signaling and device control
E. LLQ for voice and video traffic
F. directory and XML services
您可能感興趣的試卷
你可能感興趣的試題
A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol
A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)
A. Gatekeeper multizone
B. Call Admission Control (CAC)
C. Automatic Alternate Routing (AAR)
D. Survivable Remote Site Telephony (SRST)
E. Cisco Unified CallManager Express (CME)
A. 55%
B. 58%
C. 60%
D. 63%
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
最新試題
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()
Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
What are three Cisco Unified CallManager features? ()
Which two characteristics are common between traffic policing and traffic shaping?()
Within the WMM policy, how many default QoS radio access categories are there?()