A.The use of a queuing method that will give VoIP traffic strict priority over other traffic
B.The use of RTP header compression for the VoIP traffic.
C.The proper classification and marking of the traffic as close to the source as possible
D.The use of 802.1QinQ trunking for VoIP traffic
E.The use of WRED for the VoIP traffic
您可能感興趣的試卷
你可能感興趣的試題
You need to troubleshoot some problems in the Company VOIP network associated with jitter.
What is the cause of jitter? ()
A. Packet drops
B. Transmitting too many small packets
C. Variable queue delays
D. Compression
E. None of the other alternatives apply
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.
Which two statements correctly describe features of this protocol? ()
A. Control traffic between an access point and a controller is encrypted within LWAPP.
B. Data traffic between an access point and a controller is encrypted within LWAPP.
C. Layer 3 mode packets are transmitted in TCP frames.
D. Data traffic between an access point and a controller is encapsulated within LWAPP.
E. VLAN tagging and QoS markings are applied at the access point.
Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()
A. LWAPP encrypts both control traffic and user data.
B. LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.
C. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
D. LWAPP encrypts control traffic between the AP and the controller.
E. None of the other alternatives apply.
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
A. 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
B. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
C. 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates association.4. Client accepts association.5. Access point adds client MAC address to association table.
D. 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
E. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
F. None of the other alternatives apply.
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
A. The data traffic between the access point and controller is not encrypted.
B. The data traffic is encapsulated with LWAPP.
C. The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
D. The data traffic is encrypted with AES.
E. All of the above
最新試題
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Which statement is correct about RSTP port roles?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Which three statements about STP timers are true?()
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Which two statements are true when the extended system ID feature is enabled? ()
Which two statements are true about BPDU port-guard and BPDU filtering?()