You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()
A. DSCP AF21
B. DSCP CS4
C. DSCP AF33
D. DSCP AF13
第1题:
Which statement is true about the comparison of voice traffic with video traffic?()
第2题:
Which Internet Protocol(IP) telephony element is best categorizedas a voice application component?()
第3题:
Which statement is true about voice VLANs? ()
第4题:
Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()
第5题:
Which two statements are true about network voice traffic? (Choose two.)()
第6题:
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
第7题:
A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()
第8题:
video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
latency requirements are less stringent for video traffic than for voice traffic
video traffic is less sensitive to dropped packets than for voice traffic
video traffic requires the retransmission capabilities of TCP whereas voice uses UDP
video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
voice traffic requires the retransmission capabilities of TCP whereas video uses UDP
第9题:
IP phones require inline power and must be in separate VLAN to receive inline power
IP telephony applications require prioritization over other traffic as they are more delaysensitive
IP phones can only receive IP addresses through DHCP if they are in separate VLAN
The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan
第10题:
Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
Latency requirements are less stringent for video traffic than for voice traffic.
Video traffic is less sensitive to dropped packets than for voice traffic.
Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.
第11题:
A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and Layer 2 link header.
The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.
Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice samples.
The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.
第12题:
Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
Configure pNAT to ensure Voice over IP packets are properly translated.
Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
第13题:
You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()
第14题:
Which statement is true about the comparison of voice traffic with video traffic?()
第15题:
You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic. If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()
第16题:
What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?()
第17题:
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
第18题:
You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()
第19题:
Synchronizes password exchanges for call setup
Eliminates the need for physical cabling in a TCP/IP network
Enables two-way voice transmission over a packet-switched TCP/IP network
Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network
第20题:
Physically the voice network and the data network are separate.
The voice traffic will normally be on a different IP subnet than will the data traffic.
End user intervention is necessary to place the phone into the proper VLAN.
The same security policy should be implemented for both voice and data traffic.
The data VLAN must be configured as the native VLAN.
第21题:
The SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.
The SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.
The SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.
The SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.
The SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.
The SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.
第22题:
Physically the voice network and the data network are separate
The voice traffic will normally be on a different IP subnet than will the data traffic
End user intervention is necessary to place the phone into the proper VLAN
The same security policy should be implemented for both voice and data traffic
The data VLAN must be configured as the native VLAN
第23题:
requires access lists to identify the voice traffic
can allow traffic from a device without 802.1X authentication, by MAC address
can allow traffic from Cisco IP phones by listening to their CDP advertisements
allows all packets marked with a ToS of 5 to bypass authentication
allows all IP voice packets to bypass authentication via stateful inspection
第24题:
When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
The voice VLAN feature is enabled by default.
The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
The default CoS value is 1 for incoming voice and data traffic.