A.IP phones require inline power and must be in separate VLAN to receive inline power
B.IP telephony applications require prioritization over other traffic as they are more delaysensitive
C.IP phones can only receive IP addresses through DHCP if they are in separate VLAN
D.The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan
您可能感興趣的試卷
你可能感興趣的試題
According to the information presented in the following exhibit, can you tell me the reason that thetrust state of interface FastEthernet 0/3 displays "not trusted"?()
A.The command mis qos needs to be turned on in global configuration mode
B.DSCP map needs to be configured for VOIP
C.ToS has not been configured
D.There is not a Cisco Phone attached to the interface
A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression
A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful
Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()
A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link
Based on the graphic below, which Catalyst switch interface command should be issued in orderfor the switch to instruct the phone to override the incoming CoS from the CK-PC before sendingthe packet to the switch?()
A.switchport priority extend cos 11
B.switchport priority extend cos 2
C.mis qos cos 2
D.mis qos cos 2 override
最新試題
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Drag and drop each management protocol on the above to the correct category on the below.
Match the xDSL type on the above to the most appropriate implementation on the below.
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()