A.prevent packets from being dropped B.increase available bandwidth C.reduce hardware errors D.provide predictable network service E.eliminate propagation delay F.eliminate jitter and packet loss
单项选择题WhatarethestepsforconfiguringstatefulNBARfordynamicprotocols?()
A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. E.configure video streaming. Configure audio streaming. Attach the codec to an interface
单项选择题Twositesareusingamultisitecentralizedcallprocessingmodel.ThevoicegatewayontheremotebranchhaslostIPconnectivitytoitsCiscoCallManagerserver.WhichfeatureenablestheremotegatewaytotaketheroleofthecallagentduringtheWANfailure?()
A.automated alternate routing (AAR) B.Cisco CallManager Attendant Console C.real-time protocol (RTP) D.Survivable Remote Site Telephony (SRST)
多项选择题WhichtwostatementsregardingtheWirelessLANSolutionEngine(WLSE)aretrue?()
A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS) B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs C.WLSE requires the 2700 location appliance to offer location tracking D.WLSE can locate rogue APs and automatically shut them down E.WLSE configuration is done using the command line interface (CLI) or a WEB based template
多项选择题Whichthreemethodswouldhelppreventcriticalnetwork-trafficpacketlossonhighspeedinterfaces?()
A.policy routing B.increase link capacity C.WRED D.CBWFQ E.LFI F.WFQ
多项选择题Whichtwostatementsbestdescribeenhancedwirelesssecurityencryption?()
A.TKIP protects RC4 encryption keys B.CKIP and TKIP protect AES encryption keys C.TKIP encryption is more processor intensive than AES encryption is D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption