Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()
A.The DHCP pool needs to have an import all statement.
B.The DHCP pool is missing an option 150 ip 10.59.138.1 statement.
C.The DHCP pool is missing an option 139 ip 10.59.138.1 statement
D.The DHCP pool is missing a dns-server 10.59.138.1 statement.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Select the true statement.()
A.The interval value should be configured at 150ms since that is target latency budget.
B.This router never delayed any packets.
C.This router is provisioned for a 256K DSL link.
D.The inside LAN interface is Ethernet 0/0.
A.Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B.Configure pNAT to ensure Voice over IP packets are properly translated.
C.Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
D.Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
A.There is lower bandwidth consumption for VoIP media streams.
B.Teleworkers can have the same extensions and inward-dialing numbers at their office desks and home offices.
C.Personal calls are routed directly through the residential PSTN line.
D.Teleworkers can have different extensions at their office desks and home offices.
E.There is less burden on Cisco CallManager for signaling traffic.
F.Incoming calls are first routed to the office desks, then to the home offices.
A.most widely deployed by service providers
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds
E.supports connection of two routers without the use of a DSL access concentrator
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
最新試題
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
Refer to the exhibit. Select the true statement.()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()
Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()