單項(xiàng)選擇題

Look at the graphic below, the connectivity between Cisco IP phone access port and theworkstation CK-PC has been established, how to manage the traffic?()

A.The IP phone access port will override the priority of the frames received from the CK-PC
B.The IP phone access port would trust the priority of the frames received from the CK-PC
C.The switch port FaO/4 would neglect the priority of the frames received from the CK-PC
D.The switch port FaO/4 would trust the priority for the frames received from the CK-PC


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

An IP phone connects a user to a switch as shown below:

Based on the diagram shown above, which statement is true about the voice traffic coming to theswitch access port that is connected to the IP phone?()

A.A PC connected to a switch port via an IP phone is unaware of the presence of the phone
B.The traffic on the voice VLAN must be tagged with 802.1p encapsulation in order to coexist onthe same LAN segment with a PC
C.To improve the quality of the voice traffic, no other devices should be attached to the IP phone
D.The voice VLAN must be configured as a native VLAN on the switch
E.A PC connected to a switch port via an IP phone must support a trunking encapsulation

2.多項(xiàng)選擇題Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()

A.Antenna power is a relative value reference to dBi
B.LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
C.Characteristics of antennas are directionality, gain, and polarization
D.Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
E.The WLAN solution Engine (WLSE) is used to control lightweight access points
F.One of the advantages of the lightweight WLAN solution is that the devices act indepently

4.單項(xiàng)選擇題On the wireless LAN, A client is searching for an access point (AP). What is the correct processorder that this client and access point goes through in order to create a connection?()

A.association request/response, probe request/response, authentication request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, authentication request/response, association request/response
D.probe request/response, association request/response, authentication request/response
E.None of the other alternatives apply

5.單項(xiàng)選擇題

Exhibit:

In this scenario the signal transmitted from the AP is reflected off a wall, resulting in multipathinterference at the client end (ClientA). Which of the following statements is true?()

A.The transmitted signal from the AP arrives at the client at slightly different times resulting inphase shifting
B.Multipath interference can be solved by using dual antennas
C.If signal 2 is close to 360 degrees out of phase with signal 1, the result is essentially zero signalor a dead spot in the WLAN
D.Multipath interference is less of an issue when using a DSSS technology because multipath isfrequency selective
E.If signal 1 is in phase with signal 2, the result is essentially zero signal or a dead spot in theWLAN
F.None of the other alternatives apply

最新試題

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:單項(xiàng)選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項(xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

cisco ios command to interface dialer 0

題型:問答題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項(xiàng)選擇題

Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below

題型:問答題

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:單項(xiàng)選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項(xiàng)選擇題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:單項(xiàng)選擇題