A.DiffServ
B.IntServ
C.RSVP
D.WFQ
您可能感興趣的試卷
你可能感興趣的試題
A. 3600 series
B. 7200 series with NSE-1
C. 7500 series
D. 12000 series
A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
Which routing protocol best fits these requirements?()
- Supported by multiple router vendors
- Requires minimum router CPU and memory resources
- Uses a simple routing metric
- Supports manual or automatic route summarization
A.EIGRP
B.OSPF
C.IS-IS
D.RIPv2
DRAG DROP
DRAG DROP
A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. optical technology for transmitting up to 32 channels over multiple fiber strands
B. optical technology for transmitting up to 16 channels over multiple fiber strands
C. a WDM system that is compatible with EDFA technology
D. a technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM .
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
最新試題
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which technology allows centralized storage services to be shared across different VSANs?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which signal and noise values will result in the best phone communication with an access point?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links