A.synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B.enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C.enables low latency queuing to ensure that voice traffic receives priority treatment
D.enforces a trust boundary on switch access ports and uplinks/downlinks
E.modifies queue sizes as well as queue weights where required
F.adjusts link speeds to adapt to QoS needs
您可能感興趣的試卷
你可能感興趣的試題
A.class-based policing is configured using the Modular QoS command-line (MQC)
B.only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN links
C.Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configuration
D.both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic
A.serialization delay
B.end-to-end delay
C.lack of bandwidth
D.inconsistent port costs
E.routing table convergence issues
F.poor file transfer rates
A.video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
B.latency requirements are less stringent for video traffic than for voice traffic
C.video traffic is less sensitive to dropped packets than for voice traffic
D.video traffic requires the retransmission capabilities of TCP whereas voice uses UDP
E.video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
F.voice traffic requires the retransmission capabilities of TCP whereas video uses UDP
A.the two steps of digital to analog conversion are decompression and reconstruction of the analog signal
B.the two steps of digital to analog conversion are decoding and filtering
C.the two steps of digital to analog conversion are decompression and filtering of the analog signal
D.the two steps of digital to analog conversion are quantization and decoding
A.Choose Configure >Access_Point, then enter the AP MAC address
B.Choose Configure >Access_Point, then enter the IP address of the AP
C.Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menu
D.Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu
A.the best-effort class will need to have its percentage entered in the QoS Policy Generation screen
B.SDM QoS wizard provides real-time validation of application usage of WAN bandwidth
C.the SDM wizard is not able to monitor QoS policing traffic
D.the SDM QoS wizard is pre-installed on enterprise routers
A.Cisco WCS Base and Cisco WCS Location both indicate rogue AP location only in a Rogue AP Alarm text file
B.Cisco WCS Base and Cisco WCS Location both indicate rogue AP location in a map at the most probable location that is calculated by two or more APs
C.Cisco WCS Base identifies the general location of rogue APs based on the signal strength received by the nearest managed Cisco APs, whereas Cisco WCS Location adds high-accuracy location tracking to within a few meters of the rogue AP
D.Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map at the most probable location that is calculated by two or more APs
E.Cisco WCS Base does not have this feature, whereas Cisco WCS Location can indicate rogue AP location in a map beside the nearest associated AP
A.end-to-end delay
B.interference from bulk data traffic
C.processing delays
D.serialization delays
E.jitter
A.centralized management for autonomous access points
B.centralized management for lightweight access points
C.integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D.integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E.the inclusion of an integrated AAA server F an external AAA-server requirement
A.QoS can be enabled on interfaces used for Easy VPN clients
B.QoS can be enabled on IPsec VPN interfaces and tunnels
C.QoS can be enabled on interfaces with an existing QoS policy
D.the QoS policy can be enabled for incoming and outgoing traffic on the interface
最新試題
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
In a VoIP network, which type of interface would an analog fax machine connect to?()
Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
What is the term that is used to describe the process of converting a signal from digital to analog?()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()