單項(xiàng)選擇題You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()

A.IP phones require inline power and must be in separate VLAN to receive inline power
B.IP telephony applications require prioritization over other traffic as they are more delaysensitive
C.IP phones can only receive IP addresses through DHCP if they are in separate VLAN
D.The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

According to the information presented in the following exhibit, can you tell me the reason that thetrust state of interface FastEthernet 0/3 displays "not trusted"?()

A.The command mis qos needs to be turned on in global configuration mode
B.DSCP map needs to be configured for VOIP
C.ToS has not been configured
D.There is not a Cisco Phone attached to the interface

2.單項(xiàng)選擇題Jitter is causing problems with the VOIP application in the network. What causes network jitter?()

A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression

3.多項(xiàng)選擇題VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()

A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful

4.單項(xiàng)選擇題

Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()

A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link

最新試題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:?jiǎn)柎痤}

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:?jiǎn)柎痤}

Drag and drop each management protocol on the above to the correct category on the below.

題型:?jiǎn)柎痤}

Match the xDSL type on the above to the most appropriate implementation on the below.

題型:?jiǎn)柎痤}

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:?jiǎn)雾?xiàng)選擇題

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項(xiàng)選擇題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:?jiǎn)柎痤}

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:?jiǎn)柎痤}

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題