A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E.configure video streaming. Configure audio streaming. Attach the codec to an interface
您可能感興趣的試卷
你可能感興趣的試題
A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)
A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template
A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ
A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
最新試題
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
In the design of a QoS solution, which two factors should be taken into consideration?()
What are three Cisco Unified CallManager features? ()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
Which three functions can an Integrated Services Router perform in a VoIP network?()
What is an advantage of the IntServ QoS model?()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
What is the term that is used to describe the process of converting a signal from digital to analog?()
What are the three models of quality of service (QoS) in a network?()