A.The parent policy-map shapes and the child policy-map queues.
B.The mean-rate and burst-size must always be the same value.
C.This will not work without a Dialer interface configured.
D.The shaper provides congestion feedback.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented.
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.
A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3
A.IPM should not be run on a production network.
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement.
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months.
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
最新試題
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
Which statement regarding 802.1X is true?()
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()