A.The use of a queuing method that will give VoIP traffic strict priority over other traffic
B.The use of RTP header compression for the VoIP traffic
C.The proper classification and marking of the traffic as close to the source as possible
D.The use of 802.1QinQ trunking for VoIP traffic
E.The use of WRED
您可能感興趣的試卷
你可能感興趣的試題
A.IP phones require inline power and must be in separate VLAN to receive inline power
B.IP telephony applications require prioritization over other traffic as they are more delaysensitive
C.IP phones can only receive IP addresses through DHCP if they are in separate VLAN
D.The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan
According to the information presented in the following exhibit, can you tell me the reason that thetrust state of interface FastEthernet 0/3 displays "not trusted"?()
A.The command mis qos needs to be turned on in global configuration mode
B.DSCP map needs to be configured for VOIP
C.ToS has not been configured
D.There is not a Cisco Phone attached to the interface
A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression
A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful
Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()
A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link
最新試題
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Which three statements accurately describe IOS Firewall configurations?()
Drag the DSL local loop topic on the left to the correct descriptions on the right.
Which statement correctly describes IPsec VPN backup technology?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()