A.uplink speed less than 768kbps
B.supporting Voice-over-IP
C.using PPPoE encapsulation
D.using PPPoA encapsulation
E.uplink speed greater than 768kbps
您可能感興趣的試卷
你可能感興趣的試題
A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow.
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.Twenty bytes of header will be replaced with five bytes.
B.If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets.
C.The IPSec packets will be dropped by Router A's compression logic.
D.The voice packets will not be compressed.
A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead.
D.IPSec requires additional overhead for the header and hash.
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.UDP ports 16384 through 32727
B.ESP packets less than 113 byes
C.DiffServ codepoint EF Expedited Forwarding
D.RTP ports 6970 through 6999
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication
最新試題
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
Refer to the exhibit. Which statement is true regarding the topology?()
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()