A. 0
B. 1
C. 10
D. 20
您可能感興趣的試卷
你可能感興趣的試題
A.Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
B.Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
C.Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
D.Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
E.Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
F.Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings
Refer to the exhibit. Which statement is true about a voice VLAN?()
A.Physically the voice network and the data network are separate
B.The voice traffic will normally be on a different IP subnet than will the data traffic
C.End user intervention is necessary to place the phone into the proper VLAN
D.The same security policy should be implemented for both voice and data traffic
E.The data VLAN must be configured as the native VLAN
A.probe request/response, authentication request/response, association request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, association request/response, authentication request/response
D.association request/response, probe request/response, authentication request/response
A.0
B.1
C.10
D.200
A. Voice traffic data flow involves large volumes of large packets.
B. Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
C. Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
D. Voice packets are very sensitive to delay and jitter.
E. Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
A. Voice traffic is affected more by link speed than FTP traffic is.
B. Voice traffic is affected more by packet delays than FTP traffic is.
C. Voice streams involve larger packet sizes than most TCP network traffic involves.
D. Voice traffic is more sensitive to packet loss than TCP network traffic is.
E. Voice traffic requires QOS mechanisms only in heavily loaded network segments.
Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
A.Router A is responsible for answering ARP requests sent to the virtual IP address
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address ofRouter A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG
A.The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two
B.The leading zeroes in any 16-bit segment do not have to be written.
C.Every 16-bit segment that consists of all zeroes can be represented with a single colon
D.The trailing zeroes in any 16-bit segment do not have to be written.
E.Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon
F.Two zeroes in the middle of any 16-bit segment do not have to be written
Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()
A.R4(config)# ip default-network 10.0.0.0
B.R4(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
C.R4(config)# ip route 10.0.0.0 255.0.0.0 10.1.1.1
D.R4(config-router)# default-information originate
最新試題
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()
Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is the significance of the icon?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
What are two rules for compacting IPv6 addresses?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
Which two statements about voice VLANs are correct?()
Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()
Which two statements are true about voice VLANs?()
Refer to the exhibit. Which two statements are correct?()