A.When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
B.The voice VLAN feature is enabled by default.
C.The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
D.The default CoS value is 1 for incoming voice and data traffic.
您可能感興趣的試卷
你可能感興趣的試題
You work as a network engineer for. You study the exhibit carefully.
What type of attack would be mitigated by this configuration?()
A.CDP manipulation
B.VLAN hopping
C.MAC spoofing
D.MAC flood attack
E.ARP spoofing
F.spanning tree compromises
You want to enhance the security within the LAN and prevent VLAN hopping.
What two steps can be taken to help prevent this?()
A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security
The network administrator has enabled BPDU guard on the LAN.
Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A.BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
B.BPDU guard can guarantee proper selection of the root bridge.
C.BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D.BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E.None of the other alternatives apply
Refer to the exhibit.
What is the sequence of events when a VoIP call is placed from IP phone P1 to IP phone P2? ()
A.RTP traffic is exchanged between IP phone P1 and IP phone P2. IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2.
B.CCM instructs IP phone P1 to provide dialtone. IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2.
C.CCM instructs IP phone P1 to provide dialtone.IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. RTP traffic is exchanged between IP phone P1 and IP phone P2. CCM routes call to PSTN or IP phone P2.
D.IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2.
Exhibit:
You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys.
What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()
A.The wireless client adapter will not be authenticated by the authentication server, but the access point deliver the packets to the intended receiver.
B.The wireless client adapter will not be able to send any packets to the access point.
C.The access point will discard the packets and never deliver them to the intended receiver.
D.The wireless client adapter will be authenticated by the authentication server and the access point will deliver the packets to the intended receiver.
最新試題
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Which two statements are true when the extended system ID feature is enabled? ()
Which router redundancy protocol cannot be configured for interface tracking?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
What is the configured priority value of the Vlan105’s group on DS2 ?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()