單項選擇題You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()

A.data marked with DSCP AF21,VOIP marked with DSCP EF
B.data marked with DSCP AF51,VOIP marked with DSCP EF
C.data marked with the DE-bit,VOIP marked with the CLP-bit
D.data marked with DSCP EF,VOIP marked with DSCP AF31
E.data marked with IP precedence 5 VOIP marked with DSCP EF


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue. What action will likely fix this problem?()

A.mark VOIP traffic with IP precedence 6 and configure only ’fair-queue’ on the links
B.configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles
C.enable class-based traffic shaping on the VoIP traffic class
D.enable Layer 2 fragmentation and interleaving on the links
E.enable Frame Relay on the links and send voice and data on different Frame Relay PVCs

3.單項選擇題Which of these is a valid differentiated services PHB? ()

A.Guaranteed PHB
B.Class-Selector PHB
C.Reserved Forwarding PHB
D.Discard Eligible PHB
E.Priority PHB

4.多項選擇題Which two of these are differences between traffic policing and traffic shaping?()

A.with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
B.with policing you can tune the buffer usage for traffic exceeding the specified CIR
C.with shaping you can tune the buffer usage for traffic exceeding the specified CIR
D.shaping should only be applied for ingress traffic,policing only for egress
E.policing uses a token bucket algorithm,shaping uses an SPD algorithm

5.單項選擇題You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one?()

A.Both support normal and extended VLAN ranges.
B.ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.
C.ISL encapsulates the original frame.
D.Both support native VLANs.
E.802.1Q does not encapsulate the original frame.