A. Layer 1 intercontroller roaming
B. Layer 2 intercontroller roaming
C. Layer 3 intercontroller roaming
D. Layer 4 intercontroller roaming
您可能感興趣的試卷
你可能感興趣的試題
Sun Stable is a global insurance company with headquarters located in Houston, Texas. Thecampus there is made up of a number of office buildings located within the same vicinity. In 2003,a new building.
Building 331B was added. The additional building houses approximately 1000 employees. Ratherthan deploy a private branch exchange (PBX) in the new building, Sun Stable has decided toimplement an IP telephony solution. External calls will be carried across a MAN link to anotherbuilding, where a gateway connects into the worldwide PBX network of Sun Stable. Voice mail andunified messaging components are required and all IP phones and workstations should be on separate VLANs and IP subnets.
ActualTests.comWhich IP telephony deployment best suits their need?()
A. single-site
B. multisite with centralized call processing
C. multisite with distributed call processing
D. clustering over the WAN
A. DiffServ
B. IntServ
C. RSVP
D. WFQ
A. multicast routing uses RPF
B. multicast routing is connectionless.
C. In multicast routing, the source of a packet is known.
D. When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
E. Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination
A. 3600 series
B. 7200 series with NSE-1
C. 7500 series
D. 12000 series
Which routing protocol best fits these requirements?()
- Supported by multiple router vendors
- Requires minimum router CPU and memory resources
- Uses a simple routing metric
- Supports manual or automatic route summarization
A. EIGRP
B. OSPF
C. IS-IS
D. RIPv2
A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. fixed broadcast
B. open looped
C. quality equalization
D. VoD delivery
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
最新試題
Which statement about Fibre Channel communications is correct?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
What is the recommended radius of a cell for a voice-ready wireless network?()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which two statements about an interface configured with the asr-group command are correct? ()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
What is the traditional mode for a firewall?()