單項選擇題Two sites are using a multisite centralized call processing model. The voice gateway on the remote branch has lost IP connectivity to its Cisco CallManager server. Which feature enables the remote gateway to take the role of the call agent during the WAN failure? ()

A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true ?()

A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template

2.多項選擇題Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()

A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ

3.多項選擇題Which two statements best describe enhanced wireless security encryption?()

A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption

4.多項選擇題What are three facts control plane policing? ()

A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane

5.多項選擇題Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

最新試題

Which three practices are important to the implementation of a DiffServ QoS architecture?()

題型:多項選擇題

Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()

題型:多項選擇題

What is an advantage of the IntServ QoS model?()

題型:單項選擇題

Which of the items stated is typically the most expensive method of improving QoS across WAN links?()

題型:單項選擇題

End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()

題型:單項選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項選擇題

Which two commands should be entered on a WLAN controller to remove any residual configuration?()

題型:單項選擇題

What is the term that is used to describe the process of converting a signal from digital to analog?()

題型:單項選擇題

What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()

題型:多項選擇題

What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

題型:多項選擇題