You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, th

题目

You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()

A. DSCP AF21

B. DSCP CS4

C. DSCP AF33

D. DSCP AF13


相似考题

2.【A popular service that has attercted the interest of companies and has home users alike is the sending of voice signals over an IP-based network, such as the Internet. The practice of making telephone calls over the internet has had a number of different names, including packet voice, voice over packet, voice over the internet, internet telephone, and Voice over Ip(Voip). But it appears the industry has settled on the term”Voice ove IP” in reference to the internet protocol, which controls the transfer of data over the internet. There are currently three ways to deliver VoIp to users, the first technique is found at the corporate level. Many companies are offering VoIP systerms that operate over a local area network. These systems involve a fair amount of equipment, such as VoIP servers, special IP-enabled telephones, and routers that can direct telephone calls. Today a large portion of corporate sites have converted their older internal telephone systems to VoIP systems that opreate over a LAN, thus converging two systems into one. A second common solution is the one often encountered at home. Using existing telephones, a special converter is added between the telephone and a high speed internet(DSL or cable modem)connection. The converter digitizes the voice signal and creates a stream of packets that are then sent over an ip connection.The third technique involves smart cell phones. Never cell technologies are all packet-based, thus requiring a telephone call to be converted to digital packets and sending those packets over IP networks.】From the paragraph above,a popular service that has attracetd the interest of companies and home users,is termed as () . The data transfer over the Internet is controlled by the () . At corporate level, many companies have replaced their older internal telephone systerms with () that oprerate over a local area network.A、voice over the internet B、voice over packet C、Voice over IP D、internet telephony A、packet B、internet protocol C、industry D、VoIp servers A、VoIP systems B、IP-enablde telephones C、VoIP servers D、routers

更多“You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic”相关问题
  • 第1题:

    Which statement is true about the comparison of voice traffic with video traffic?()

    • A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
    • B、 Latency requirements are less stringent for video traffic than for voice traffic.
    • C、 Video traffic is less sensitive to dropped packets than for voice traffic.
    • D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
    • E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
    • F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

    正确答案:A

  • 第2题:

    Which Internet Protocol(IP) telephony element is best categorizedas a voice application component?()

    • A、IP telephone
    • B、Voice gateway
    • C、Private branch exchange (PBX)
    • D、Advanced audio conferencing software

    正确答案:D

  • 第3题:

    Which statement is true about voice VLANs? ()

    • A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
    • B、The voice VLAN feature is enabled by default.
    • C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
    • D、The default CoS value is 1 for incoming voice and data traffic.

    正确答案:C

  • 第4题:

    Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()

    • A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packets
    • B、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packets
    • C、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets
    • D、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and  network management packets
    • E、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets
    • F、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets

    正确答案:A,E

  • 第5题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第6题:

    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

    • A、requires access lists to identify the voice traffic 
    • B、can allow traffic from a device without 802.1X authentication, by MAC address
    • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
    • D、allows all packets marked with a ToS of 5 to bypass authentication
    • E、allows all IP voice packets to bypass authentication via stateful inspection

    正确答案:B,C

  • 第7题:

    A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()

    • A、Configure traffic shaping to reduce the bandwidth available to the file sharing application.
    • B、Configure a separate VLAN for the IP phones.
    • C、Install a content caching proxy at the branch to reduce inbound WAN traffic.
    • D、Upgrade switches to provide higher bandwidth ports for workstations and IP phones.

    正确答案:A

  • 第8题:

    多选题
    Which statement is true about the comparison of voice traffic with video traffic?()
    A

    video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows

    B

    latency requirements are less stringent for video traffic than for voice traffic

    C

    video traffic is less sensitive to dropped packets than for voice traffic

    D

    video traffic requires the retransmission capabilities of TCP whereas voice uses UDP

    E

    video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows

    F

    voice traffic requires the retransmission capabilities of TCP whereas video uses UDP


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    单选题
    You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()
    A

    IP phones require inline power and must be in separate VLAN to receive inline power

    B

    IP telephony applications require prioritization over other traffic as they are more delaysensitive

    C

    IP phones can only receive IP addresses through DHCP if they are in separate VLAN

    D

    The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement is true about the comparison of voice traffic with video traffic?()
    A

     Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.

    B

     Latency requirements are less stringent for video traffic than for voice traffic.

    C

     Video traffic is less sensitive to dropped packets than for voice traffic.

    D

     Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.

    E

     Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.

    F

     Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is true about IP telephony calls?()
    A

     A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.

    B

     The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.

    C

     Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.

    D

     The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
    A

    Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.

    B

    Configure pNAT to ensure Voice over IP packets are properly translated.

    C

    Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 

    D

    Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()

    • A、IP phones require inline power and must be in separate VLAN to receive inline power
    • B、IP telephony applications require prioritization over other traffic as they are more delaysensitive
    • C、IP phones can only receive IP addresses through DHCP if they are in separate VLAN
    • D、The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan

    正确答案:B

  • 第14题:

    Which statement is true about the comparison of voice traffic with video traffic?()

    • A、video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
    • B、latency requirements are less stringent for video traffic than for voice traffic
    • C、video traffic is less sensitive to dropped packets than for voice traffic
    • D、video traffic requires the retransmission capabilities of TCP whereas voice uses UDP
    • E、video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
    • F、voice traffic requires the retransmission capabilities of TCP whereas video uses UDP

    正确答案:B,D

  • 第15题:

    You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic. If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()

    • A、DSCP AF21
    • B、DSCP CS4
    • C、DSCP AF33
    • D、DSCP AF13

    正确答案:A

  • 第16题:

    What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?()

    • A、VTP
    • B、802.1 q
    • C、CDP
    • D、Skinny Station Protocol

    正确答案:C

  • 第17题:

    Which two statements correctly identify factors to consider when Configuring WAN QoS?()

    • A、Voice Traffic uses Assured Forwarding
    • B、Voice Signaling traffic uses Assured Forwarding
    • C、Voice Signaling traffic uses priority queuing
    • D、Voice Traffic uses priority queuing
    • E、Voice signaling traffic should use priority queuing with Assured Forwarding

    正确答案:B,D

  • 第18题:

    You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()

    • A、8
    • B、6
    • C、9
    • D、5

    正确答案:A

  • 第19题:

    单选题
    What is a benefit of Internet protocol (IP) telephony?()
    A

    Synchronizes password exchanges for call setup

    B

    Eliminates the need for physical cabling in a TCP/IP network

    C

    Enables two-way voice transmission over a packet-switched TCP/IP network

    D

    Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Refer to the exhibit. Which statement is true about a voice VLAN?()
    A

     Physically the voice network and the data network are separate.

    B

     The voice traffic will normally be on a different IP subnet than will the data traffic.

    C

     End user intervention is necessary to place the phone into the proper VLAN.

    D

     The same security policy should be implemented for both voice and data traffic.

    E

     The data VLAN must be configured as the native VLAN.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()
    A

    The SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.

    B

    The SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.

    C

    The SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.

    D

    The SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.

    E

    The SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.

    F

    The SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.


    正确答案: C,F
    解析: 暂无解析

  • 第22题:

    单选题
    Refer to the exhibit. Which statement is true about a voice VLAN?()
    A

    Physically the voice network and the data network are separate

    B

    The voice traffic will normally be on a different IP subnet than will the data traffic

    C

    End user intervention is necessary to place the phone into the proper VLAN

    D

    The same security policy should be implemented for both voice and data traffic

    E

    The data VLAN must be configured as the native VLAN


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
    A

    requires access lists to identify the voice traffic

    B

    can allow traffic from a device without 802.1X authentication, by MAC address

    C

    can allow traffic from Cisco IP phones by listening to their CDP advertisements

    D

    allows all packets marked with a ToS of 5 to bypass authentication

    E

    allows all IP voice packets to bypass authentication via stateful inspection


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement is true about voice VLANs? ()
    A

    When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.

    B

    The voice VLAN feature is enabled by default.

    C

    The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.

    D

    The default CoS value is 1 for incoming voice and data traffic.


    正确答案: C
    解析: 暂无解析