A.IPM should not be run on a production network.
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement.
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months.
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.
您可能感興趣的試卷
你可能感興趣的試題
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router
A.CiscoWorks VPN Manager
B.deploy Linksys routers with menu-driven configuration
C.Easy VPN client mode
D.disable 802.1x and Auth Proxy on the Teleworker router
A.RSVP is a required configuration to support conference calls without voice packet loss.
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams.
C.Call admission control is an issue only when using hardware DSP resources.
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling
A.No additional steps are required.
B.Add the appropriate source-interface command.
C.The router cannot access a server in the Enterprise Campus network.
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
A.The interface must be configured as point-to-multipoint
B.The sustained cell rate and the burst rate are equal
C.The router's configuration will also include a Dialer interface
D.The configuration must also include a sub-interface with a VPI/VCI of 8/35
Refer to the exhibit. Which statement is true regarding the topology?()
A.An IPSec tunnel cannot be established between Router A and Router B
B.The Linksys Firewall router does not support PPPoE
C.Destination addresses defined in RFC 1918 are not supported within an IPSec tunnel
D.The phone and PC behind Router A will not be able to connect to a host on 192.168.1.0/24
最新試題
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()
Refer to the exhibit. Which statement is true regarding the topology?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()