A.DSL with 128k uplink /128k downlink
B.cable with 256k uplink /256k downlink
C.DSL with 128k uplink /768k downlink
D.cable with 256k uplink /1.4M downlink
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.UDP ports 16384 through 32727
B.ESP packets less than 113 byes
C.DiffServ codepoint EF Expedited Forwarding
D.RTP ports 6970 through 6999
A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented.
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3
A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
A.RSVP is a required configuration to support conference calls without voice packet loss.
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams.
C.Call admission control is an issue only when using hardware DSP resources.
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.
A.VPN tunnel authentication is part of the IKE specification.
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
A.The interface must be configured as point-to-multipoint
B.The sustained cell rate and the burst rate are equal
C.The router's configuration will also include a Dialer interface
D.The configuration must also include a sub-interface with a VPI/VCI of 8/35
A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow.
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.
最新試題
For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
Refer to the exhibit. Which statement is true regarding the topology?()
In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()
Which statement regarding 802.1X is true?()
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()