单选题Which statement best describes the application of link fragmentation and interleaving (LFI)?()A It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB It fragments larger packets and allows VoIP packets to be

题目
单选题
Which statement best describes the application of link fragmentation and interleaving (LFI)?()
A

It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first

B

It fragments larger packets and allows VoIP packets to be transmitted in between them.

C

It stops the transmission of large packets when priority packets arrive.

D

It sends high priority packets in between normal traffic packets.


相似考题
更多“单选题Which statement best describes the application of link fragmentation and interleaving (LFI)?()A It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB It fragments larger packets and allows VoIP packets to be”相关问题
  • 第1题:

    Which two statements are true about MLP interleaving? ()

    A. It fragments and encapsulates all packets in a fragmentation header.

    B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.

    C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.

    D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.


    参考答案:B, D

  • 第2题:

    Refer to the exhibit. A router has a 256 kbps Frame Relay circuit connected to interface serial 0/0. As a large FTP packet is being placed into the hardware transmit queue of interface serial 0/0, a voice packet is placed into the priority queue of that interface. How, and in what order, wi the packets be transmitted?()

    • A、the voice packet will be transmitted first, followed by the FTP packet in its entirety
    • B、the voice packet will be transmitted first, followed by the fragmented FTP packet
    • C、the FTP packet will be fragmented and the voice packet will be interleaved
    • D、the FTP packet will be transmitted first in its entirety, follow by the voice packet

    正确答案:D

  • 第3题:

    Which of these tools should you use to compress VoIP packets on a low-speed Frame Replay circuit?()

    • A、Cisco Proprietary payload compression
    • B、Predictor payload compression
    • C、RTP header compression
    • D、TCP header compression

    正确答案:C

  • 第4题:

    Which statement best describes the application of link fragmentation and interleaving (LFI)?()

    • A、It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first
    • B、It fragments larger packets and allows VoIP packets to be transmitted in between them.
    • C、It stops the transmission of large packets when priority packets arrive.
    • D、It sends high priority packets in between normal traffic packets.

    正确答案:B

  • 第5题:

    Which layer in the TCP/IP model is responsible for delivering packets to their destination?()

    • A、Application Layer
    • B、Transport Layer
    • C、Internet Layer
    • D、Network Access Layer

    正确答案:C

  • 第6题:

    In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the pseudowire packet.The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly.In pseudowire packet, where is this Control Word inserted?()

    • A、Inserted between the MPLS label stack and the Layer 3 payload
    • B、Inserted between the MPLS label stack and the Layer 3 Header
    • C、Inserted between the MPLS label stack and the Layer 2 payload
    • D、Inserted between the MPLS label stack and the Layer 2 header

    正确答案:C

  • 第7题:

    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

    • A、Worm
    • B、Smurf
    • C、Logic Bomb
    • D、Man-in-the-middle

    正确答案:B

  • 第8题:

    单选题
    In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the pseudowire packet.The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly.In pseudowire packet, where is this Control Word inserted?()
    A

    Inserted between the MPLS label stack and the Layer 3 payload

    B

    Inserted between the MPLS label stack and the Layer 3 Header

    C

    Inserted between the MPLS label stack and the Layer 2 payload

    D

    Inserted between the MPLS label stack and the Layer 2 header


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()
    A

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.

    B

    Voice traffic data flow involves large volumes of large packets.

    C

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.

    D

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.

    E

    Voice packets are very sensitive to delay and jitter.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement best describes the application of link fragmentation and interleaving (LFI)?()
    A

    It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first

    B

    It fragments larger packets and allows VoIP packets to be transmitted in between them.

    C

    It stops the transmission of large packets when priority packets arrive.

    D

    It sends high priority packets in between normal traffic packets.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which command allows you to decode packets in JUNOS?()
    A

    debug packet interface-name

    B

    show interface extensive

    C

    traceoptions interface-name

    D

    monitor traffic interface interface-name


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about MLP interleaving? ()
    A

    It fragments and encapsulates all packets in a fragmentation header.

    B

    Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.

    C

    Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.

    D

    It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    Which two statements are true about MLP interleaving? ()

    • A、 It fragments and encapsulates all packets in a fragmentation header.
    • B、 Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
    • C、 Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
    • D、 It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.

    正确答案:B,D

  • 第14题:

    What are two ways to minimize the delay of VoIP packets that are traversing a network?()

    • A、Use WFQ, CBWFO, and LLO to prioritize delay-sensitive packets
    • B、Use WFO, CBWFO, and LLO to compress the payload.
    • C、Give TCP packets priority over UDP packets.
    • D、Use control plane policing for cRTP queuing.
    • E、Use stacker and predictor to compress the payload.

    正确答案:A,E

  • 第15题:

    VOIP is being implemented in the Company network and you need to assess the need for QoS.   Which of the following network problems would indicate a need to implement QoS features?()

    • A、Mis-routed packets  
    • B、Excess jitter
    • C、Delay of critical traffic
    • D、Packet loss due to congestion
    • E、Data link layer broadcast storms
    • F、FTP connections unsuccessful

    正确答案:B,C,D

  • 第16题:

    A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()

    • A、packet segmentation
    • B、serialized checking
    • C、packet sequencing
    • D、parallel checking

    正确答案:A,C

  • 第17题:

    Which statement is true about IP telephony calls?()

    • A、 A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.
    • B、 The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.
    • C、 Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.
    • D、 The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

    正确答案:D

  • 第18题:

    What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

    • A、 Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.
    • B、 Use WFQ, CBWFQ, and LLQ to compress the payload.
    • C、 Give TCP packets priority over UDP packets.
    • D、 Use control plane policing for cRTP queuing.
    • E、 Use stacker and predictor to compress the payload.

    正确答案:A,E

  • 第19题:

    单选题
    Refer to the exhibit. A router has a 256 kbps Frame Relay circuit connected to interface serial 0/0. As a large FTP packet is being placed into the hardware transmit queue of interface serial 0/0, a voice packet is placed into the priority queue of that interface. How, and in what order, wi the packets be transmitted?()
    A

    the voice packet will be transmitted first, followed by the FTP packet in its entirety

    B

    the voice packet will be transmitted first, followed by the fragmented FTP packet

    C

    the FTP packet will be fragmented and the voice packet will be interleaved

    D

    the FTP packet will be transmitted first in its entirety, follow by the voice packet


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement is true about IP telephony calls?()
    A

     A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.

    B

     The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.

    C

     Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.

    D

     The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which EIGRP packet statement is true?()
    A

    Update packets route reliable change information only to the affected routers.

    B

    Reply packets are multicast to IP address 224.0.0.10 using RTP.

    C

    On high - speed links, hello packets are broadcast every 5 seconds for neighbor discovery.

    D

    Reply packets are used to send routing updates.

    E

    On low - speed links, hello packets are broa dcast every 15 seconds for neighbor discovery.


    正确答案: E
    解析: 暂无解析

  • 第22题:

    单选题
    Which of these tools should you use to compress VoIP packets on a low-speed Frame Replay circuit?()
    A

    Cisco Proprietary payload compression

    B

    Predictor payload compression

    C

    RTP header compression

    D

    TCP header compression


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about MLP interleaving? ()
    A

    It fragments and encapsulates all packets in a fragmentation header.

    B

    Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.

    C

    Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.

    D

    It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.


    正确答案: D,C
    解析: 暂无解析

  • 第24题:

    单选题
    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
    A

    Worm

    B

    Smurf

    C

    Logic Bomb

    D

    Man-in-the-middle


    正确答案: D
    解析: 暂无解析