單項選擇題

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling.
Given these types of applications, how many different classes will need to be configured in QoS?()

A. 8
B. 6
C. 9
D. 5


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)

A. flags indicating the kind of autoconfiguration that can be done by hosts
B. default router information
C. /64 prefix that can be used on the link and the lifetime of the prefix
D. IPv6 DHCP server address information

4.單項選擇題As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()

A. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C. NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
D. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

5.單項選擇題As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()

A. It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B. It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C. It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D. It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.


最新試題

Refer to the exhibit. For the given configuration, on packets leaving the router on interface FastEthernet0/0 that matches the high traffic class, what will the MPLS experimental bit be set to?()

題型:單項選擇題

With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()

題型:單項選擇題

Refer to the exhibit. Which two of these statements are correct? (Choose two.)()

題型:多項選擇題

Which command displays only those entries in a BGP table with specific AS_PATH attributes?()

題型:單項選擇題

Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()

題型:單項選擇題

Which command is used to view IPv6 parameters related to the BGP process?()

題型:單項選擇題

Refer to the exhibit. Which two of these events will be the result of issuing the above command? ()(Choose two.)

題型:多項選擇題

What is the purpose of using VPN hardware acceleration equipment?()

題型:單項選擇題

In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()

題型:單項選擇題

When a Cisco router is configured for SSH, it acts as an ()?

題型:單項選擇題