單項選擇題Due to limitations affecting voice quality, which of the broadband speeds shown is preferred in order to achieve highest voice quality on a converged data and voice teleworker connection?()

A.DSL with 128k uplink /128k downlink
B.cable with 256k uplink /256k downlink
C.DSL with 128k uplink /768k downlink
D.cable with 256k uplink /1.4M downlink


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client

2.單項選擇題

Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()

A.The DHCP pool needs to have an import all statement. 
B.The DHCP pool is missing an option 150 ip 10.59.138.1 statement.
C.The DHCP pool is missing an option 139 ip 10.59.138.1 statement
D.The DHCP pool is missing a dns-server 10.59.138.1 statement.

3.單項選擇題

Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()

A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3

5.單項選擇題An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

A.Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B.Configure pNAT to ensure Voice over IP packets are properly translated.
C.Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 
D.Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

6.多項選擇題When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()

A.uplink speed less than 768kbps
B.supporting Voice-over-IP
C.using PPPoE encapsulation
D.using PPPoA encapsulation
E.uplink speed greater than 768kbps

7.單項選擇題Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

8.多項選擇題

Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()

A.The interface must be configured as point-to-multipoint
B.The sustained cell rate and the burst rate are equal
C.The router's configuration will also include a Dialer interface
D.The configuration must also include a sub-interface with a VPI/VCI of 8/35

9.單項選擇題A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()

A.No additional steps are required. 
B.Add the appropriate source-interface command. 
C.The router cannot access a server in the Enterprise Campus network. 
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.

最新試題

When is an IPSec SA built on the Teleworker Router?()

題型:單項選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:單項選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:單項選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:單項選擇題

A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()

題型:單項選擇題

Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()

題型:多項選擇題

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

題型:多項選擇題

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

題型:單項選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

題型:單項選擇題

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

題型:單項選擇題