Because voice data packets must follow a single dedicated path through the network
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because lost voice-data packets must be retransmitted
Because data does not need to arrive intact, so data transfer rates can be variable
第1题:
Why is QoS important in a converged network?()
第2题:
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
第3题:
When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()
第4题:
Which three practices are important to the implementation of a DiffServ QoS architecture?()
第5题:
What are two major sources of delay that can be managed by QoS in voice-enabled networks?()
第6题:
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
第7题:
In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()
第8题:
Because data does not need to arrive intact, so data transfer rates can be variable
Because lost voice-data packets must be retransmitted
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because voice data packets must follow a single dedicated path through the network
第9题:
the number of packets that are discarded because they exceed the maximum packet size of the medium
errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
the number of packets that are discarded because they are smaller than the minimum packet size of the medium
the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
the number of times that the interface requested another interface within the router to slow down
第10题:
Because voice data packets must follow a single dedicated path through the network
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because lost voice-data packets must be retransmitted
Because data does not need to arrive intact, so data transfer rates can be variable
第11题:
Complete Recovery with online redo log
Complete Recovery with archived redo log
Tablespace Point-in-Time Recovery (TSPITR)
Incomplete Recovery with system change number (SCN)
第12题:
Physically the voice network and the data network are separate
The voice traffic will normally be on a different IP subnet than will the data traffic
End user intervention is necessary to place the phone into the proper VLAN
The same security policy should be implemented for both voice and data traffic
The data VLAN must be configured as the native VLAN
第13题:
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()
第14题:
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()
第15题:
If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()
第16题:
Why is QoS important in a converged network?()
第17题:
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()
第18题:
A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem?()
第19题:
end-to-end delay
interference from bulk data traffic
processing delays
serialization delays
jitter
第20题:
Packets can arrive out of order.
Packets must take the same path to the destination.
Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.
Packets can experience varying delays across the network.
Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.
第21题:
latency must be kept below 150 ms
latency is not a concern as long as jitter is kept below 30 ms
voice packets do not require a specific type of queuing
voice packets are rather small
voice packets require TCP for rapid retransmission of dropped packets
voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload
第22题:
Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.
Voice traffic data flow involves large volumes of large packets.
Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
Voice packets are very sensitive to delay and jitter.
第23题:
Voice traffic data flow involves large volumes of large packets.
Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
Voice packets are very sensitive to delay and jitter.
Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
第24题:
requires access lists to identify the voice traffic
can allow traffic from a device without 802.1X authentication, by MAC address
can allow traffic from Cisco IP phones by listening to their CDP advertisements
allows all packets marked with a ToS of 5 to bypass authentication
allows all IP voice packets to bypass authentication via stateful inspection