單項選擇題An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each, terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs, and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue. What action will likely fix this problem?()

A.mark VOIP traffic with IP precedence 6 and configure only ’fair-queue’ on the links
B.configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles
C.enable class-based traffic shaping on the VoIP traffic class
D.enable Layer 2 fragmentation and interleaving on the links
E.enable Frame Relay on the links and send voice and data on different Frame Relay PVCs


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree  Protocol IEEE 802.1D? ()

A.Designated Root Cost
B.bridge ID priority
C.max age
D.bridge ID MAC address
E.Designated Root Priority
F.forward delay

2.單項選擇題To troubleshoot network issues more accurately, milliseconds should be included in the syslog of the router. Which command will achieve this?()

A.service timestamps log datetimec msec
B.logging timestamps msec
C.syslog timestamps hour minute second miliseconds
D.service logging timestamp msec
E.logging service timestamp msec

7.單項選擇題After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with "%SEC-6-IPACCESSLOG" appeared on the Syslog server. What can be done to resolve this situation?()

A.Increase memory allocation for ACLs.
B.Remove all entries from the ACL and use a single permit ip any any statement.
C.Remove the log keyword from each ACL entry.
D.Reboot the device after the ACL has been applied.

8.單項選擇題Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()

A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs

10.單項選擇題While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()

A.a routing protocol that is flooding updates
B.a flapping port that is generating BPDUs with the TCN bit set
C.STP is not running on the switch
D.a user that is downloading the output of the show-tech command
E.a corrupted switch CAM table

最新試題

Which QoS mechanism can help classify different kinds of Citrix traffic (print job versus real-time terminal control)?()

題型:單項選擇題

Which IOS security feature is configured by the ip inspect inspection-name {in  out} command?()

題型:單項選擇題

Which statement best describes OSPF external LSAs (type 5)?()

題型:單項選擇題

You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS. Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?()

題型:單項選擇題

What does the OSPF command capability vrf-lite achieve?()

題型:單項選擇題

In which way can the IPv6 address of 2031:0000:130F:0000:0000:09C0:876A:130B be expressed most efficiently?()

題型:單項選擇題

Which three statements are true about policing? ()

題型:多項選擇題

What is the STP root guard feature designed to prevent?()

題型:單項選擇題

When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both have the same bridge priority configured, which parameter determines the winner?()

題型:單項選擇題

Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()

題型:多項選擇題