A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E.configure video streaming. Configure audio streaming. Attach the codec to an interface
您可能感興趣的試卷
你可能感興趣的試題
A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)
A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template
A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ
A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
最新試題
What is an advantage of the IntServ QoS model?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which Control Plane Policing (CoPP) statement is true?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
Which three practices are important to the implementation of a DiffServ QoS architecture?()