單項選擇題

Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()

A.The router is limiting the size of TCP and UDP packets. 
B.The configuration implements an effective Layer-2 fragmentation technique.
C.The value of 542 is recommended in several RFCs. 
D.There is another upstream router terminating the PPPoE session.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()

A.The parent policy-map shapes and the child policy-map queues.
B.The mean-rate and burst-size must always be the same value.
C.This will not work without a Dialer interface configured.
D.The shaper provides congestion feedback.

2.單項選擇題

Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()

A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented. 
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.

3.多項選擇題What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions

4.單項選擇題

Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()

A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3

5.單項選擇題Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

A.IPM should not be run on a production network. 
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement. 
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months. 
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.

最新試題

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

題型:單項選擇題

Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()

題型:單項選擇題

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

題型:單項選擇題

Refer to the exhibit. Select the true statement.()

題型:單項選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:單項選擇題

Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

題型:單項選擇題

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

題型:單項選擇題

Refer to the exhibit. Which statement is true regarding the topology?()

題型:單項選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:單項選擇題

Which statement regarding 802.1X is true?()

題型:單項選擇題