單項選擇題You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()

A.IP phones require inline power and must be in separate VLAN to receive inline power
B.IP telephony applications require prioritization over other traffic as they are more delaysensitive
C.IP phones can only receive IP addresses through DHCP if they are in separate VLAN
D.The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

According to the information presented in the following exhibit, can you tell me the reason that thetrust state of interface FastEthernet 0/3 displays "not trusted"?()

A.The command mis qos needs to be turned on in global configuration mode
B.DSCP map needs to be configured for VOIP
C.ToS has not been configured
D.There is not a Cisco Phone attached to the interface

2.單項選擇題Jitter is causing problems with the VOIP application in the network. What causes network jitter?()

A.Variable queue delays
B.Packet drops
C.Transmitting too many small packets
D.Compression

3.多項選擇題VOIP is being implemented in the network and you need to assess the need for QoS. Which of thefollowing network problems would indicate a need to implement QoS features?()

A.Mis-routed packets
B.Excess jitter
C.Delay of critical traffic
D.Packet loss due to congestion
E.Data link layer broadcast storms
F.FTP connections unsuccessful

4.單項選擇題

Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command isconfigured on the switch port interface connected to the IP phone?()

A.Effectively, the trust boundary has been moved to the PC attached to the IP phone
B.The computer is now establishing theCoS value and has effectively become the trust boundary
C.The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PCattached to the IP phone
D.The switch will no longer tag incoming voice packets and will extend the trust boundary to thedistribution layer switch
E.RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link

最新試題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:單項選擇題

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:單項選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:問答題

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:問答題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:問答題

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項選擇題