A.requires access lists to identify the voice traffic
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection
您可能感興趣的試卷
你可能感興趣的試題
A.Upgrade your residential broadband service to at least 768kbps uplink.
B.Switch your home router to use PPP encapsulation.
C.Use the ip tcp adjust-mss interface command.
D.Employ QoS techniques to drop large data packets.
E.Use traffic shaping to interrupt large data packets.
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is().
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
A.TCP packet sizes can be optimized by the router so there is no IPSec or AAL5 padding.
B.The local loop is a dedicated connection for a single subscriber to the DSLAM.
C.Access to the WAN media uses a poll/response mechanism so no two subscribers transmit at the same time.
D.There are no distance requirements from the Central Office (CO).
Refer to the exhibit. Asymmetric broadband service with significantly greater downstream bandwidth is recommended for Teleworker deployment. Which reason is the most accurate?()
A.Most ISPs do not provide QoS for residential broadband. Asymmetric bandwidth reduces the chance of downstream congestion when traffic from Internet sites competes for bandwidth with IP voice traffic.
B.Additional downstream bandwidth compensates for insufficient upstream bandwidth. The aggregate bandwidth provides the same result.
C.The additional bandwidth is needed to access more than one site. Most HTTP traffic is downstream.
D.The additional downstream bandwidth allows the Enterprise VPN device to send the IP voice packets much faster, allowing them to reach the Teleworker network with less latency.
A.when all access to the Internet is through the IPSec tunnel
B.when there is direct Internet access via split-tunneling
C.when there is no Internet access configured through the Teleworker router
D.whenever you have IOS-Firewall (CBAC) configured
最新試題
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()