Refer to the exhibit.
Which statement is true about where trust boundaries should be established in a network?()
A.Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to establish a trust boundary.
B.Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.
C.Endpoint 2 is the only acceptable place to establish a trust boundary.
D.Endpoint 1 is the only acceptable place to establish a trust boundary.
E.Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.
F.Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.
您可能感興趣的試卷
你可能感興趣的試題
You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office.
Which three statements are true about the voice VLAN feature on this switch?()
A.The default CoS value for incoming traffic is set up to 0.
B.The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C.PortFast is automatically disabled when a voice VLAN is configured.
D.The voice VLAN feature is disabled by default.
E.The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F.When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port
Refer to the exhibit. Which statement is true about a voice VLAN?()
A.Physically the voice network and the data network are separate.
B.The voice traffic will normally be on a different IP subnet than will the data traffic.
C.End user intervention is necessary to place the phone into the proper VLAN.
D.The same security policy should be implemented for both voice and data traffic.
E.The data VLAN must be configured as the native VLAN.
A.TCP retransmits
B.UDP priority
C.Bursty
D.Delay sensitive
E.Greedy
F.Drop sensitive
Refer to the exhibit.
What are three of the basic components of a VoIP network?()
A.software voice applications
B.multipoint control unit (MCU)
C.gatekeeper
D.call agent
E.interactive voice response (IVR) systems
F.softphones
A.The use of a queuing method that will give VoIP traffic strict priority over other traffic
B.The use of RTP header compression for the VoIP traffic.
C.The proper classification and marking of the traffic as close to the source as possible
D.The use of 802.1QinQ trunking for VoIP traffic
E.The use of WRED for the VoIP traffic
最新試題
Which two statements about the various implementations of STP are true?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Which two statements are true when the extended system ID feature is enabled? ()
If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
Which two statements are true about BPDU port-guard and BPDU filtering?()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Refer to the exhibit. Which statement is true about the output?()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()