When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()A. rate limit voice trafficB. configure spanning-tree for fast link conver

题目
When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()

A. rate limit voice traffic

B. configure spanning-tree for fast link convergence

C. isolate voice traffic on separate VLANs

D. classify and mark traffic close to the source


相似考题
参考答案和解析
参考答案:B, C, D
更多“When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? () A. rate li”相关问题
  • 第1题:

    Which two of these are characteristics of MPLS VPNs?()

    A. Layer 3 MPLS VPNs can forward only IP packets

    B. Layer 2 MPLS VPNs can forward any network protocol

    C. MPLS label paths are automatically formed based on Layer 2 frames

    D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames

    E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies


    参考答案:A, B

  • 第2题:

    ●The network layer provides services to the transport layer.It can be based on either(71).In both cases,its main job is(请作答此空)packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and(73)for packets.Network designers attempt to avoid congestion by proper design.Techniques include(74)policy,caching,flow control,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource(75),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP),differentiated services,and MPLS.

    A.dealing with
    B.routing
    C.sending
    D.receiving

    答案:B
    解析:

  • 第3题:

    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

    • A、Enable the highest level of Syslogging available to ensure you log all possible event messages
    • B、Use SSH to access your Syslog information
    • C、Log all messages to the system buffer so that they can be displayed when accessing the router
    • D、Syncronize clocks on the network with a protocol such as Network Time Protocol

    正确答案:D

  • 第4题:

    You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()

    • A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
    • B、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
    • C、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
    • D、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
    • E、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
    • F、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

    正确答案:A,B,C

  • 第5题:

    Which two statements about the Adaptive Services PIC are true? ()

    • A、The Adaptive Services PIC supports the Layer 3 service package by default.
    • B、The Adaptive Services PIC is required when using the secure shell to access an M-series router.
    • C、The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously.
    • D、The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time.

    正确答案:A,D

  • 第6题:

    Which two statements are true about the application of QoS in a converged network?()

    • A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
    • B、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
    • C、end-to-end network delay is not a factor as long as the  delay is consistent
    • D、some packet loss can be corrected by codec algorithms
    • E、RSVP handles voice packet retransmission
    • F、fragmentation is a result of packet loss

    正确答案:B,D

  • 第7题:

    When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()

    • A、 rate limit voice traffic
    • B、 configure spanning-tree for fast link convergence
    • C、 isolate voice traffic on separate VLANs
    • D、 classify and mark traffic close to the source

    正确答案:B,C,D

  • 第8题:

    What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。

    • A、VLAN support
    • B、compression
    • C、authentication
    • D、sliding windows
    • E、multilink support
    • F、quality of service

    正确答案:B,C,E

  • 第9题:

    What are three benefits of class of service?()

    • A、It can make a slow network faster.
    • B、It can prioritize latency-sensitive traffic.
    • C、It can eliminate congestion.
    • D、It can control congestion.
    • E、It can allocate bandwidth for different classes of traffic.

    正确答案:B,D,E

  • 第10题:

    多选题
    Which two of these are characteristics of MPLS VPNs?()
    A

    Layer 3 MPLS VPNs can forward only IP packets

    B

    Layer 2 MPLS VPNs can forward any network protocol

    C

    MPLS label paths are automatically formed based on Layer 2 frames

    D

    Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames

    E

    In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    单选题
    Which part of the text helps if you are angry about the Building Service?
    A

    HELP US TO HELP YOU

    B

    YOUR BUILDING SERVICE

    C

    WHAT YOU CAN DO IF THINGS GO WRONG


    正确答案: A
    解析:
    由文章最后一部分内容可得出答案。

  • 第12题:

    多选题
    What are three benefits of class of service?()
    A

    It can make a slow network faster.

    B

    It can prioritize latency-sensitive traffic.

    C

    It can eliminate congestion.

    D

    It can control congestion.

    E

    It can allocate bandwidth for different classes of traffic.


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。

    A.VLAN support

    B.compression

    C.authentication

    D.sliding windows

    E.multilink support

    F.quality of service


    参考答案:B, C, E

  • 第14题:

    Which two statements about voice VLANs are correct?()

    • A、Voice VLANs eliminate the need for QoS configuration
    • B、Voice VLANs are used on trunk links to eliminate the need for QoS CoS markings
    • C、Voice VLANs are mainly used to reduce the number of access switch ports that are used in the network
    • D、Voice VLANs can be configured to forward existing CoS priorities or override them
    • E、Voice VLANs are mainly used between access layer switches and distribution layer switches
    • F、Voice VLANs can be configured on Layer 2 ports only

    正确答案:D,F

  • 第15题:

    When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()

    • A、rate limit voice traffic
    • B、configure spanning-tree for fast link convergence
    • C、isolate voice traffic on separate VLANs
    • D、classify and mark traffic close to the source

    正确答案:B,C,D

  • 第16题:

    What are three benefits of class of service?()

    • A、It can make a slow network faster
    • B、It can prioritize latency-sensitive traffic
    • C、It can elimitane congestion
    • D、It can control congestion
    • E、It can allocate bandwidth for different classes of traffic

    正确答案:B,D,E

  • 第17题:

    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

    • A、NAC can authenticate using 802.1X and IBNS cannot
    • B、NAC can ensure only compliant machines connect and IBNS cannot
    • C、NAC can ensure access to the correct network resources and IBNS cannot
    • D、NAC can manage user mobility and reduce overhead costs and IBNS cannot

    正确答案:B

  • 第18题:

    Which two of these are characteristics of MPLS VPNs? ()

    • A、 Layer 3 MPLS VPNs can forward only IP packets
    • B、 Layer 2 MPLS VPNs can forward any network protocol
    • C、 MPL S label paths are automatically formed based on Layer 2 frames
    • D、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
    • E、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

    正确答案:A,B

  • 第19题:

    Which three statements are true about Cisco IOS Firewall?()

    • A、It can be configured to block Java traffic.
    • B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
    • C、It can only examine network layer and transport layer information.
    • D、It can only examine transport layer and application layer information.
    • E、The inspection rules can be used to set timeout values for specified protocols.
    • F、The ip inspect cbac-name command must be configured in global configuration mode.

    正确答案:A,B,E

  • 第20题:

    Which of the following is a best practice that can be used to ensure consistency when building systems?()

    • A、Server build checklist
    • B、Server baselining tools
    • C、Architecture diagrams
    • D、Hardware compatibility list

    正确答案:A

  • 第21题:

    多选题
    Which two statements about the Adaptive Services PIC are true? ()
    A

    The Adaptive Services PIC supports the Layer 3 service package by default.

    B

    The Adaptive Services PIC is required when using the secure shell to access an M-series router.

    C

    The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously.

    D

    The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time.


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    多选题
    When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()
    A

    rate limit voice traffic

    B

    configure spanning-tree for fast link convergence

    C

    isolate voice traffic on separate VLANs

    D

    classify and mark traffic close to the source


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()
    A

    rate limit voice traffic

    B

    configure spanning-tree for fast link convergence

    C

    isolate voice traffic on separate VLANs

    D

    classify and mark traffic close to the source


    正确答案: A,D
    解析: 暂无解析