A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.
C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
E. The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
您可能感興趣的試卷
你可能感興趣的試題
A. packetization
B. quantization
C. decoding
D. sampling
A. to eliminate the need for VoIP gateways
B. to scale a VoIP installation with multiple gateways
C. to provide call admission control and limit the number of simultaneous calls on the network
D. to meet the requirement to control H·323 gateways on a LAN
E. to accept call requests and reduce the load on the gateway
A. codec
B. link speed
C. Layer 2 encapsulation
D. packet overhead (IP/UDP/RTP)
E. link delay
F. total number of simultaneous calls that are allowed
A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.
B. Use WFQ, CBWFQ, and LLQ to compress the payload.
C. Give TCP packets priority over UDP packets.
D. Use control plane policing for cRTP queuing.
E. Use stacker and predictor to compress the payload.
A. programming interface to external applications
B. FXS and FXO port negotiation
C. AutoQos VoIP trust boundaries
D. signaling and device control
E. LLQ for voice and video traffic
F. directory and XML services
A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol
A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)
A. Gatekeeper multizone
B. Call Admission Control (CAC)
C. Automatic Alternate Routing (AAR)
D. Survivable Remote Site Telephony (SRST)
E. Cisco Unified CallManager Express (CME)
A. 55%
B. 58%
C. 60%
D. 63%
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
最新試題
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()
What are the three models of quality of service (QoS) in a network?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
Which two characteristics are common between traffic policing and traffic shaping?()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()