單項(xiàng)選擇題

Refer to the exhibit. 
Which statement is true about where trust boundaries should be established  in a network?()


A.Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable  place to establish a trust boundary.
B.Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable  places to establish a trust boundary.
C.Endpoint 2 is the only acceptable place to establish a trust boundary.  
D.Endpoint 1 is the only acceptable place to establish a trust boundary.
E.Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable  place to establish a trust boundary.
F.Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable  places to establish a trust boundary.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. 
Which  three statements are true about the voice VLAN feature on this switch?()

A.The default CoS value for incoming traffic is set up to 0.
B.The CoS value is trusted for 802.1p or 802.1q tagged traffic.
C.PortFast is automatically disabled when a voice VLAN is configured.
D.The voice VLAN feature is disabled by default.
E.The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
F.When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

2.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A.Physically the voice network and the data network are separate.
B.The voice traffic will normally be on a different IP subnet than will the data traffic.
C.End user intervention is necessary to place the phone into the proper VLAN.
D.The same security policy should be implemented for both voice and data traffic.
E.The data VLAN must be configured as the native VLAN.

3.多項(xiàng)選擇題Which three are characteristics of voice traffic in the Company VOIP campus network?()

A.TCP retransmits
B.UDP priority
C.Bursty
D.Delay sensitive
E.Greedy
F.Drop sensitive

4.多項(xiàng)選擇題

Refer to the exhibit.  
What are three of the basic components of a VoIP network?()

A.software voice applications
B.multipoint control unit (MCU)  
C.gatekeeper  
D.call agent
E.interactive voice response (IVR) systems  
F.softphones

5.多項(xiàng)選擇題Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()

A.The use of a queuing method that will give VoIP traffic strict priority over other traffic  
B.The use of RTP header compression for the VoIP traffic.
C.The proper classification and marking of the traffic as close to the source as possible
D.The use of 802.1QinQ trunking for VoIP traffic
E.The use of WRED for the VoIP traffic

6.單項(xiàng)選擇題

You need to troubleshoot some problems in the Company VOIP network associated with jitter.  
What is the cause of jitter?  ()

A. Packet drops
B. Transmitting too many small packets
C. Variable queue delays
D. Compression
E. None of the other alternatives apply

7.多項(xiàng)選擇題

The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. 
 Which two statements correctly describe features of this protocol? ()

A. Control traffic between an access point and a controller is encrypted within LWAPP.
B. Data traffic between an access point and a controller is encrypted within LWAPP.
C. Layer 3 mode packets are transmitted in TCP frames.
D. Data traffic between an access point and a controller is encapsulated within LWAPP.
E. VLAN tagging and QoS markings are applied at the access point.

8.單項(xiàng)選擇題

Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()

A. LWAPP encrypts both control traffic and user data.
B. LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.
C. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco  Aironet APs.
D. LWAPP encrypts control traffic between the AP and the controller.
E. None of the other alternatives apply.

9.單項(xiàng)選擇題

Which set of statements describes the correct order and process of a Company wireless user  client associating with a wireless access point in the Company network? ()

A. 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.
B. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.
C. 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates  association.4. Client accepts association.5. Access point adds client MAC address to association  table.
D. 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.
E. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.
F. None of the other alternatives apply.

10.單項(xiàng)選擇題

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()

A. The data traffic between the access point and controller is not encrypted.
B. The data traffic is encapsulated with LWAPP.
C. The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.
D. The data traffic is encrypted with AES.
E. All of the above

最新試題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:?jiǎn)雾?xiàng)選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:?jiǎn)雾?xiàng)選擇題