單項(xiàng)選擇題What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? ()

A.CiscoWorks Wireless LAN Solution Engine (WLSE)
B.CiscoWorks Wireless LAN Solution Engine (WLSE) Express
C.Cisco Wireless Control System (WCS)
D.Wireless Domain Services (WDS)
E.WLAN Controllers (WLC)


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What are two reasons for packet loss on a VoIP connection?()

A.serialization delay
B.overrun
C.full buffers and queues
D.propagation delay
E.shaping delay
F.TCP header errors

2.單項(xiàng)選擇題Which statement is true about the components of a queuing mechanism?()

A.Each subinterface has its own hardware queue and can experience congestion just like its main interface
B.Hardware queuing is only used if the software queues are experiencing congestion.
C.Hardware queues and software queues are not used concurrently.
D.The hardware queuing system always uses the FIFO queuing mechanism.

3.多項(xiàng)選擇題Which two statements are true about the protocols that are used for transmitting voice traffic?()

A.RTP multiplexing is used to keep multiple phone conversations separate
B.RTP provides end-to-end delivery services for voice traffic.
C.UDP is used to ensure a reliable transmission from sender to receiver.
D.RTP is used to provide resource reservation for the voice stream.
E.UDP provides multiplexing of multiple phone conversations.

4.多項(xiàng)選擇題What are two components of the OoS Integrated Services (IntServ) model? ()

A.link efficiency
B.admission control
C.classification and marking
D.shaping and policing
E.congestion avoidance using the RTP protocol
F.resource reservation using the RSVP protocol

5.多項(xiàng)選擇題Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()

A.802.1X
B.Cisco Temporal Key Integrity Protocol (CKIP)
C.Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
D.Cisco Message Integrity Check (CMIC)
E.One-Time Passwords (OTP)
F.Advanced Encryption Standard (AES)

6.單項(xiàng)選擇題

Refer to the exhibit. The network has been configured with H.323 gateways and gatekeepers as shown. Which statement is true when a call is placed?()

 

A.A gatekeeper is contacted to determine the correct local gateway to use.
B.A gateway will receive the call and forward a call request to the local gatekeeper.
C.A gateway will receive the call and forward a call request to the gatekeeper on the other side of the WAN
D.A gatekeeper will receive the call and forward a call request to the remote gateway.

7.多項(xiàng)選擇題What are three Cisco Unified CallManager features?()

A.programming interface to external applications
B.FXS and FXO port negotiation
C.AutoQos VoIP trust boundaries
D.signaling and device control
E.LLO for voice and video traffic
F.directory and XML services

8.多項(xiàng)選擇題Which two statements about WRED are true? ()

A.WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.
B.Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.
C.WRED will throttle back voice traffic only as a last resort.
D.If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.
E.WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.
F. WRED treats non-IP traffic as precedence 4.

10.多項(xiàng)選擇題Which two statements describe traffic policing?()

A.Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B.Excess traffic is buffered so that the traffic remains within the desired rate.
C.Packets that conform to traffic policies are not delayed.
D.Packet marking is available and allows excess packets to be re-marked with a lower priorit

最新試題

Which two QoS classification and marking statements are true? ()

題型:多項(xiàng)選擇題

Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()

題型:?jiǎn)雾?xiàng)選擇題

In a VoIP network, which type of interface would an analog fax machine connect to?()

題型:?jiǎn)雾?xiàng)選擇題

End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()

題型:?jiǎn)雾?xiàng)選擇題

What are three Cisco Unified CallManager features? ()

題型:多項(xiàng)選擇題

For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()

題型:多項(xiàng)選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項(xiàng)選擇題

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

題型:多項(xiàng)選擇題

What is the term that is used to describe the process of converting a signal from digital to analog?()

題型:?jiǎn)雾?xiàng)選擇題

Within the WMM policy, how many default QoS radio access categories are there?()

題型:?jiǎn)雾?xiàng)選擇題