A.latency must be kept below 150 ms
B.latency is not a concern as long as jitter is kept below 30 ms
C.voice packets do not require a specific type of queuing
D.voice packets are rather small
E.voice packets require TCP for rapid retransmission of dropped packets
F.voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
您可能感興趣的試卷
你可能感興趣的試題
A.header compression
B.payload compression
C.low latency queuing (LLQ)
D.weighted random early detection (WRED)
E.traffic policing
F.traffic shaping
A.a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol
B.RSVP uses DSCP to signal QoS requirements to routers
C.RSVP is a routing protocol
D.RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455
E.RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic
F.the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP)
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) 
uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS
A.WMM using DCF
B.WMM using EDCAF
C.802.1e using DCF
D.802.1e using EDCAF
A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
A.5
B.15
C.25
D.35
E.45
F.55
A.bursty
B.constant
C.bandwidth intensive
D.small packet sizes
E.time-sensitive
F.retransmittable
A.IP
B.TCP
C.RTP
D.UDP
E.H323
F.CRTP
A.the VoIP endpoints have the intelligence to set up and control calls
B.Call setup and control functionality is centralized in one call agent or cluster
C.Call setup and control resides in call agents that are distributed throughout the network
D.Each VoIP device has separate call control, voice packetization, and transport mechanisms
最新試題
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
What are the three models of quality of service (QoS) in a network?()
Which two characteristics are common between traffic policing and traffic shaping?()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
Which three functions are associated with a Cisco Unified CallManager? ()
In a VoIP network, which type of interface would an analog fax machine connect to?()