A.requires access lists to identify the voice traffic
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection
您可能感興趣的試卷
你可能感興趣的試題
A.Upgrade your residential broadband service to at least 768kbps uplink.
B.Switch your home router to use PPP encapsulation.
C.Use the ip tcp adjust-mss interface command.
D.Employ QoS techniques to drop large data packets.
E.Use traffic shaping to interrupt large data packets.
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is().
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
A.TCP packet sizes can be optimized by the router so there is no IPSec or AAL5 padding.
B.The local loop is a dedicated connection for a single subscriber to the DSLAM.
C.Access to the WAN media uses a poll/response mechanism so no two subscribers transmit at the same time.
D.There are no distance requirements from the Central Office (CO).
Refer to the exhibit. Asymmetric broadband service with significantly greater downstream bandwidth is recommended for Teleworker deployment. Which reason is the most accurate?()
A.Most ISPs do not provide QoS for residential broadband. Asymmetric bandwidth reduces the chance of downstream congestion when traffic from Internet sites competes for bandwidth with IP voice traffic.
B.Additional downstream bandwidth compensates for insufficient upstream bandwidth. The aggregate bandwidth provides the same result.
C.The additional bandwidth is needed to access more than one site. Most HTTP traffic is downstream.
D.The additional downstream bandwidth allows the Enterprise VPN device to send the IP voice packets much faster, allowing them to reach the Teleworker network with less latency.
A.when all access to the Internet is through the IPSec tunnel
B.when there is direct Internet access via split-tunneling
C.when there is no Internet access configured through the Teleworker router
D.whenever you have IOS-Firewall (CBAC) configured
最新試題
What is not a difference between VPN tunnel authentication and per-user authentication?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Refer to the exhibit. Select the true statement.()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()