A.The three required steps in the analog to digital conversion are sampling,encoding,and compression.
B.The three required steps in the analog to digital conversion are sampling,quantization,and compression.
C.The three required steps in the analog to digital conversion are sampling,quantization,and encoding.
D.The output of the sampling process is a pulse code modulation (PCM) signal.
E.The output of the sampling process is a pulse amplitude modulation (PAM) signal.
您可能感興趣的試卷
你可能感興趣的試題
A.Cisco AutoQoS can be used repeatedly to apply a single QoS policy to multiple interfaces.
B.Cisco AutoQoS includes an optional web-based GUI for automating the configuration of QoS services.
C.Cisco AutoQoS provides capabilities to automate VoIP deployments.
D.The auto qos global configuration command is used to configure Cisco AutoQoS.
E.The Modular QoS CLI (MQC) is the best way to fine tune QoS configurations.
F.The SDM QoS wizard is the fastest way to implement QoS.
A.DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.
B.Network traffic is identified by class, and the level of service is chosen for each class.
C.The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.
D.RSVP enables the DiffServ model to provide end-to-end QoS.
E.The DiffServ model is more scalable than the IntServ model.
F.The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.
A.AutoQos Enterprise
B.AutoQoS Campus
C.AutoQoS VoIP
D.AutoQoS LAN
A.CBWFQ
B.LLQ
C.traffic shaping
D.WRED
A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ
A.The customer uses SNMP statistics to create the policy.
B.QoS policy templates are generated and installed on the interface.
C.RTP is used to generate the policy.
D.LLQ,cRTP,and LFI are used to automatically discover the policy.
E.The auto-generated policy is manually optimized before implementation.
F.Auto-discovery is used to determine what traffic is on the interface.
A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
A.End-to-end delay is the sum of propagation delays,processing delays,serialization delays,and queuing delays.
B.Coast-to-coast end-to-end delay over an optical link is about 20 ms.
C.Processing delay depends on various factors,which include CPU speed,CPU utilization,IP switching mode, and router architecture.
D.Propagation and serialization delays are related to the media.
E.Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).
F.Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.
A.class-based weighted fair queuing (CBWFQ)
B.low latency queuing (LLQ)
C.priority queuing (PQ) or custom queuing (CQ)
D.Real-Time Transport Protocol (RTP) header compression
E.TCP header compression
F.UDP header compression
最新試題
Within the WMM policy, how many default QoS radio access categories are there?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which three functions can an Integrated Services Router perform in a VoIP network?()
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()