A.SDMVoice
B.SDMSignal
C.SDMTrans
D.SDMManage
E.SDMRout
F.SDMBulk
您可能感興趣的試卷
你可能感興趣的試題
A.Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B.Excess traffic is buffered so that the traffic remains within the desired rate.
C.Packets that conform to traffic policies are not delayed.
D.Packet marking is available and allows excess packets to be re-marked with a lower priorit
A.Queuing introduces equal delays for packets of the same flow, resulting in jitter.
B.When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.
C.All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.
D.There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.
E.In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.
F.Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping
A. If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.
B. The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.
C. With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.
D. With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
E. With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field
C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
E. The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Refer to the exhibit. Which two statements accurately describe the pictured WPA wireless LAN controller configuration?()
A.WPA1 is disabled and WPA2 is enabled.
B.WPA1 is enabled and WPA2 is disabled.
C.WPA1 is enabled and WPA2 is enabled.
D.TKIP is the default parameter for WPA1 andWPA2.
E.AES is the default parameter for WPA1 and WPA2.
F.The default WPA1 and WPA2 parameters are enabled
最新試題
Within the WMM policy, how many default QoS radio access categories are there?()
What are the three models of quality of service (QoS) in a network?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
Which three functions can an Integrated Services Router perform in a VoIP network?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()