A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E.configure video streaming. Configure audio streaming. Attach the codec to an interface
您可能感興趣的試卷
你可能感興趣的試題
A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)
A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template
A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ
A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
最新試題
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
In the design of a QoS solution, which two factors should be taken into consideration?()
What are the three models of quality of service (QoS) in a network?()
Which three functions are associated with a Cisco Unified CallManager? ()
Which two QoS classification and marking statements are true? ()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
What is an advantage of the IntServ QoS model?()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()