A. to eliminate the need for VoIP gateways
B. to scale a VoIP installation with multiple gateways
C. to provide call admission control and limit the number of simultaneous calls on the network
D. to meet the requirement to control H·323 gateways on a LAN
E. to accept call requests and reduce the load on the gateway
您可能感興趣的試卷
你可能感興趣的試題
A. codec
B. link speed
C. Layer 2 encapsulation
D. packet overhead (IP/UDP/RTP)
E. link delay
F. total number of simultaneous calls that are allowed
A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.
B. Use WFQ, CBWFQ, and LLQ to compress the payload.
C. Give TCP packets priority over UDP packets.
D. Use control plane policing for cRTP queuing.
E. Use stacker and predictor to compress the payload.
A. programming interface to external applications
B. FXS and FXO port negotiation
C. AutoQos VoIP trust boundaries
D. signaling and device control
E. LLQ for voice and video traffic
F. directory and XML services
A. link efficiency
B. admission control
C. classification and marking
D. shaping and policing
E. congestion avoidance using the RTP protocol
F. resource reservation using the RSVP protocol
A. H·323
B. UDP
C. RTP
D. TCP
E. Media Gateway Control Protocol (MGCP)
F. session initiation protocol (SIP)
A. Gatekeeper multizone
B. Call Admission Control (CAC)
C. Automatic Alternate Routing (AAR)
D. Survivable Remote Site Telephony (SRST)
E. Cisco Unified CallManager Express (CME)
A. 55%
B. 58%
C. 60%
D. 63%
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. centralized management that requires an external AAA server
D. centralized management with integrated AAA server
E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days
最新試題
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
What is an advantage of the IntServ QoS model?()
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
In a VoIP network, which type of interface would an analog fax machine connect to?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()