多項(xiàng)選擇題What are the three elements of configuring congestion management?()

A.queue creation
B.determining packet drop thresholds
C.determining the random early detection method
D.traffic classification
E.queue scheduling
F.FIFO configuration


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements are true about traffic shaping and traffic policing?()

A.both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
B.both traffic shaping and traffic policing support the marking and re-marking of traffic
C.the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
D.traffic shaping queues excess traffic whereas traffic policing discards excess traffic
E.traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

2.單項(xiàng)選擇題What is the goal of QoS in a network? ()

A.prevent packets from being dropped
B.increase available bandwidth
C.reduce hardware errors
D.provide predictable network service
E.eliminate propagation delay
F.eliminate jitter and packet loss

3.單項(xiàng)選擇題What are the steps for configuring stateful NBAR for dynamic protocols? ()

A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. 
E.configure video streaming. Configure audio streaming. Attach the codec to an interface

5.多項(xiàng)選擇題Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true ?()

A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template

6.多項(xiàng)選擇題Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()

A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ

7.多項(xiàng)選擇題Which two statements best describe enhanced wireless security encryption?()

A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption

8.多項(xiàng)選擇題What are three facts control plane policing? ()

A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane

9.多項(xiàng)選擇題Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

10.多項(xiàng)選擇題What are two components of the Cisco Lightweight WLAN solution?()

A.WCS
B.WLSE
C.Location Appliance
D.WDS
E.WLSE-Express

最新試題

SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the two types of low latency queuing available using the SDM QoS wizard?()

題型:多項(xiàng)選擇題

What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()

題型:?jiǎn)雾?xiàng)選擇題

What are three Cisco Unified CallManager features? ()

題型:多項(xiàng)選擇題

When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()

題型:多項(xiàng)選擇題

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

題型:多項(xiàng)選擇題

What are the three models of quality of service (QoS) in a network?()

題型:多項(xiàng)選擇題

Which three functions can an Integrated Services Router perform in a VoIP network?()

題型:多項(xiàng)選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項(xiàng)選擇題

What is an advantage of the IntServ QoS model?()

題型:?jiǎn)雾?xiàng)選擇題

In a VoIP network, which type of interface would an analog fax machine connect to?()

題型:?jiǎn)雾?xiàng)選擇題