單項選擇題

Jitter is causing problems with the VOIP application in the Company network. 
What causes  network jitter?()

A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. A trunk link is connected between switch A_SW and switch D_SW. Based on  the configuration shown in the exhibit, 
how would the traffic coming from the switch A_SW be  managed? ()

A.The trunk port Fa0/1 on switch A_SW will trust allCoS values on the frames coming from the IP  phone.
B.The trunk port Fa0/1 on switch A_SW will trust allCoS values on the frames received on the IP  phone.
C.The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames coming from port  Fa0/1 on A_SW.
D.The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames received on the  A_SW switch port Fa0/4.
E.The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames received on the IP  phone port.

2.單項選擇題

Refer to the exhibit. 
Which statement is true when voice traffic is forwarded on the same VLAN  used by the data traffic? ()

A.The voice traffic cannot be forwarded to the distribution layer.
B.The voice traffic cannot use 802.1p priority tagging.
C.Port security cannot be enabled on the switch that is attached to the IP phone.
D.Quality of service cannot be applied for the voice traffic.

3.單項選擇題

Refer to the exhibit.
 Why does the trust state of interface FastEthernet 0/3 show "not trusted"?  ()

A.DSCP map needs to be configured for VOIP.
B.ToS has not been configured.
C.ToS has been misconfigured.
D.The command mls qos needs to be turned on in global configuration mode.
E.There is not a Cisco Phone attached to the interface.

4.單項選擇題

Refer to the exhibit.
 What statement is true about the configuration on switch CAT1?()

A.The configuration establishes policed DSCP on ports Fa0/11 and Fa0/12 with values ranging  from 8 to 56.
B.The configuration overrides 802.1p priorities on packets entering ports Fa0/11 and Fa0/12 with  a value of 48.
C.Untagged Port VLAN ID (PVID) frames will carry voice traffic on VLAN 40.
D.Two IP phones with the MAC addresses of 0008.8595.d1a7 and 0007.8595.d2b7 are  connected to CAT1 ports Fa0/11 and Fa0/12, respectively.
E.Security violation shutdown mode has been activated for ports Fa0/11 and Fa0/12.
F.The configuration overrides the Quality of Service value in packets entering ports Fa0/11 and  Fa0/12 with a value of 45.

6.多項選擇題

Refer to the exhibit. 
Which three statements are true about trust boundaries in the campus  network?()

A.Classification and markingoccur using 802.1ab QoS bits before reaching the trust boundary.  
B.A device is trusted if it correctly declassifies packets. 
C.A device is trusted if it correctly classifies packets.
D.Network trust boundaries are automatically configured in IOS version 12.3 and later.  
E.The outermost trusted devices represent the trust boundary.
F.For scalability, classification should be done as close to the edge as possible.

7.多項選擇題

Refer to the exhibit. 
Which two statements are true about the required switch configurations to  support a voice VLAN?()

A.CDP must be disabled on the switch port to prevent interference between CDP messages and  voice traffic.
B.Port security cannot be configured on a port that is configured for a voice vlan.
C.Static secure MAC addresses should be configured on voice vlan ports to prevent access by  devices other than IP phones.
D.CDP must be enabled on the switch port to allow configuration information to be passed to the  IP phone.
E.Portfast must be enabled on the switch port.
F.802.1x authentication cannot be configured on a port configured for a voice vlan.

8.單項選擇題

You have been tasked with setting a trust boundary on the Company network.
 What is the basic  function of this trust boundary?()

A. Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.
B. Trust boundaries are a point in the network where QoS functionality begins and ends.
C. Trust boundaries determine whether certain types of traffic can pass.
D. Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.
E. None of the other alternatives apply

10.多項選擇題

You need to determine where the trust boundaries will be in a new Company VOIP design. 
Which  two statements are true about these trust boundaries?()

A.Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,
B.Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.
C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  
D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  
E.Trust boundaries define the firewall rules for QoS admission into a network.

最新試題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:單項選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:單項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題