多項(xiàng)選擇題Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  

A. The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B. The voice VLAN feature is disabled by default.
C. The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
E. PortFast is automatically disabled when a voice VLAN is configured.
F. The default CoS value for incoming traffic is set to 0.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three WLAN statements are true? (Choose three.) () 

A. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C. A dhoc mode allows mobile clients to connect directly without an intermediate AP
D. Another term for infrastructure mode is independent service set (IBSS)
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight  access point.
F. WLANs are designed to share the medium and can easily handle an increased demand of channel  contention.

2.單項(xiàng)選擇題

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust  cos on the switch port that is connected to the IP phone?()

A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary. 
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.  
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set theCoS
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.

3.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A. Physically the voice network and the data network are separate.
B. The voice traffic will normally be on a different IP subnet than will the data traffic.
C. End user intervention is necessary to place the phone into the proper VLAN.
D. The same security policy should be implemented for both voice and data traffic.
E. The data VLAN must be configured as the native VLAN.

4.多項(xiàng)選擇題Which two multicast protocol statements are true? (Choose two.)  ()

A. Dense mode multicast requires explicit join messages from their members.
B. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic.
C. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.  
D. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E. The primary use of sparse mode multicast is for test labs and router performance testing.

5.多項(xiàng)選擇題Which three IP multicast group concepts are true? (Choose three.) ()

A. If a packet is sent to a multicast group address, all members of the multicast group will receive it
B. If a packet is sent to a multicast group address, the multicast frame contains the source multicast  address
C. A router does not have to be a member of a multicast group to receive multicast data.
D. A router does not have to be a member of a multicast group to send to the group.
E. A router must be a member of a multicast group to receive multicast data.
F. A router must be a member of a multicast group to send to the group.

最新試題

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about voice packets in a LAN? (Choose two.)  ()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about voice VLANs are correct?()

題型:多項(xiàng)選擇題

Which two statements are true about voice VLANs?()

題型:多項(xiàng)選擇題

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

題型:多項(xiàng)選擇題

If a metric is not specified for routes that are redistributed into OSPF, the default metric that is assigned to the routes is 20, except for redistributed BGP routes. What is the metric that is assigned to redistributed BGP routes?()

題型:?jiǎn)雾?xiàng)選擇題