单选题Why is QoS important in a converged network?()A Because voice data packets must follow a single dedicated path through the networkB Because voice data packets should arrive quickly and sequentially, and with no lost dataC Because lost voice-data packet

题目
单选题
Why is QoS important in a converged network?()
A

Because voice data packets must follow a single dedicated path through the network

B

Because voice data packets should arrive quickly and sequentially, and with no lost data

C

Because lost voice-data packets must be retransmitted

D

Because data does not need to arrive intact, so data transfer rates can be variable


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Why is QoS important in a converged network?()A Because voice data packets must follow a single dedicated path through the networkB Because voice data packets should arrive quickly and sequentially, and with no lost dataC Because lost voice-data packet”相关问题
  • 第1题:

    Why is QoS important in a converged network?()

    • A、Because voice data packets must follow a single dedicated path through the network
    • B、Because voice data packets should arrive quickly and sequentially, and with no lost data
    • C、Because lost voice-data packets must be retransmitted
    • D、Because data does not need to arrive intact, so data transfer rates can be variable

    正确答案:B

  • 第2题:

    Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()

    • A、 Packets can arrive out of order.
    • B、 Packets must take the same path to the destination.
    • C、 Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.
    • D、 Packets can experience varying delays across the network.
    • E、 Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

    正确答案:A,D

  • 第3题:

    When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()

    • A、the number of packets that are discarded because they exceed the maximum packet size of the medium
    • B、errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
    • C、the number of packets that are discarded because they are smaller than the minimum packet size of the medium
    • D、the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
    • E、the number of times that the interface requested another interface within the router to slow down

    正确答案:C

  • 第4题:

    Which three practices are important to the implementation of a DiffServ QoS architecture?()

    • A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.
    • B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.
    • C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.
    • D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.
    • E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.
    • F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

    正确答案:C,D,F

  • 第5题:

    What are two major sources of delay that can be managed by QoS in voice-enabled networks?()

    • A、propagation delay
    • B、voice packet serialization delay
    • C、congested egress queues
    • D、header overhead
    • E、packets dropped because of CRC errors

    正确答案:C,D

  • 第6题:

    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

    • A、requires access lists to identify the voice traffic 
    • B、can allow traffic from a device without 802.1X authentication, by MAC address
    • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
    • D、allows all packets marked with a ToS of 5 to bypass authentication
    • E、allows all IP voice packets to bypass authentication via stateful inspection

    正确答案:B,C

  • 第7题:

    In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()

    • A、Complete Recovery with online redo log
    • B、Complete Recovery with archived redo log
    • C、Tablespace Point-in-Time Recovery (TSPITR)
    • D、Incomplete Recovery with system change number (SCN)

    正确答案:C

  • 第8题:

    单选题
    Why is QoS important in a converged network?()
    A

    Because data does not need to arrive intact, so data transfer rates can be variable

    B

    Because lost voice-data packets must be retransmitted

    C

    Because voice data packets should arrive quickly and sequentially, and with no lost data

    D

    Because voice data packets must follow a single dedicated path through the network


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()
    A

    the number of packets that are discarded because they exceed the maximum packet size of the medium

    B

    errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.

    C

    the number of packets that are discarded because they are smaller than the minimum packet size of the medium

    D

    the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers

    E

    the number of times that the interface requested another interface within the router to slow down


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Why is QoS important in a converged network?()
    A

    Because voice data packets must follow a single dedicated path through the network

    B

    Because voice data packets should arrive quickly and sequentially, and with no lost data

    C

    Because lost voice-data packets must be retransmitted

    D

    Because data does not need to arrive intact, so data transfer rates can be variable


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()
    A

    Complete Recovery with online redo log

    B

    Complete Recovery with archived redo log

    C

    Tablespace Point-in-Time Recovery (TSPITR)

    D

    Incomplete Recovery with system change number (SCN)


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Refer to the exhibit. Which statement is true about a voice VLAN?()
    A

    Physically the voice network and the data network are separate

    B

    The voice traffic will normally be on a different IP subnet than will the data traffic

    C

    End user intervention is necessary to place the phone into the proper VLAN

    D

    The same security policy should be implemented for both voice and data traffic

    E

    The data VLAN must be configured as the native VLAN


    正确答案: B
    解析: 暂无解析

  • 第13题:

    What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()

    • A、Centrex
    • B、Packet encryption
    • C、Intelligent call routing
    • D、QoS

    正确答案:D

  • 第14题:

    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()

    • A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  
    • B、 Voice traffic data flow involves large volumes of large packets.  
    • C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  
    • D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. 
    • E、 Voice packets are very sensitive to delay and jitter. 

    正确答案:A,E

  • 第15题:

    If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()

    • A、IPSec VPN
    • B、QoS mechanism
    • C、Firewall
    • D、NAT
    • E、EIGRP routing protocol
    • F、Static routing

    正确答案:B

  • 第16题:

    Why is QoS important in a converged network?()

    • A、Because data does not need to arrive intact, so data transfer rates can be variable
    • B、Because lost voice-data packets must be retransmitted
    • C、Because voice data packets should arrive quickly and sequentially, and with no lost data
    • D、Because voice data packets must follow a single dedicated path through the network

    正确答案:C

  • 第17题:

    What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()

    • A、QoS
    • B、Centrex
    • C、Packet encryption
    • D、Intelligent call routing

    正确答案:A

  • 第18题:

    A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()

    • A、end-to-end delay
    • B、interference from bulk data traffic
    • C、processing delays
    • D、serialization delays
    • E、jitter

    正确答案:E

  • 第19题:

    单选题
    A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()
    A

    end-to-end delay

    B

    interference from bulk data traffic

    C

    processing delays

    D

    serialization delays

    E

    jitter


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
    A

    Packets can arrive out of order.

    B

    Packets must take the same path to the destination.

    C

    Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.

    D

    Packets can experience varying delays across the network.

    E

    Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which three statements are true about the data traffic characteristics of voice traffic? ()
    A

    latency must be kept below 150 ms

    B

    latency is not a concern as long as jitter is kept below 30 ms

    C

    voice packets do not require a specific type of queuing

    D

    voice packets are rather small

    E

    voice packets require TCP for rapid retransmission of dropped packets

    F

    voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    多选题
    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()
    A

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.

    B

    Voice traffic data flow involves large volumes of large packets.

    C

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.

    D

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.

    E

    Voice packets are very sensitive to delay and jitter.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about voice packets in a LAN? (Choose two.)  ()
    A

    Voice traffic data flow involves large volumes of large packets.

    B

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.

    C

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.

    D

    Voice packets are very sensitive to delay and jitter.

    E

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
    A

    requires access lists to identify the voice traffic

    B

    can allow traffic from a device without 802.1X authentication, by MAC address

    C

    can allow traffic from Cisco IP phones by listening to their CDP advertisements

    D

    allows all packets marked with a ToS of 5 to bypass authentication

    E

    allows all IP voice packets to bypass authentication via stateful inspection


    正确答案: C,B
    解析: 暂无解析