网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()
A

Upgrade your residential broadband service to at least 768kbps uplink.

B

Switch your home router to use PPP encapsulation.

C

Use the ip tcp adjust-mss interface command.

D

Employ QoS techniques to drop large data packets.

E

Use traffic shaping to interrupt large data packets.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()AUpgrade your residential broadband service to at least 768kbps uplink.BSwitch your home router to use PPP encapsulation.CUse the ip tcp adjust-mss interface command.DEmploy QoS techniques to drop large data packets.EUse traffic shaping to interrupt large data packets.” 相关考题
考题 - ()- It arrives by mail, I suppose. A、How does your remittance comeB、When will your remittance arriveC、From which country does your remittance come

考题 Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

考题 Which service does the ERX Edge Router support with a virtual router?() A.voice over IPB.wholesale servicesC.IP quality of serviceD.SNMP management

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A.WLAN AutoConfigB.WWAN AutoConfigC.Computer BrowserD.Portable Device Enumerator Service

考题 Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?() A. Broadband personal comm. Service (PCS)B. Broadband circuitC. InfraredD. Spread spectrumE. Cable

考题 If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

考题 Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()A、Broadband personal comm. Service (PCS)B、Broadband circuitC、InfraredD、Spread spectrumE、Cable

考题 When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing

考题 Which WAN service utilizes two different encapsulation types (one for data and one for signaling) on its data link layer?()A、ISDNB、Frame RelayC、ATMD、FDDI

考题 An important limitation of the Cisco Business Ready Teleworker solution is_____.()A、IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.B、More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.C、Compressed RTP and IPSec are not compatible and result in no bandwidth savings.D、Broadband modems must support Quality of Service for adequate voice quality.

考题 Which service component in the plan phase evaluates the readiness of your current facilities infrastructure to support Cisco Unified Communications system development()A、Network Readiness AssessmentB、Operation Readiness AssessmentC、Site Readiness AssessmentD、Application Readiness Assessment

考题 Which two options are benefits of the Cisco Software Support?()A、Supports your risk mitigation planB、Increase the performance of the current featuresC、Expedites the delivery of replacement hardwareD、Extends the life of Cisco Devices with Software Updates

考题 You are about to design a very fast convergence time on a service provider network. Which feature wouldyou utilize to declare a link failure within less than two seconds of the fault on a link?()A、fast convergence SFPB、MTU discoveryC、redundancy linksD、keepaliveE、carrier delay

考题 Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()A、Upgrade your residential broadband service to at least 768kbps uplink.B、Switch your home router to use PPP encapsulation.C、Use the ip tcp adjust-mss interface command.D、Employ QoS techniques to drop large data packets.E、Use traffic shaping to interrupt large data packets.

考题 VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag?()A、provide service internetworkingB、support transparency for Layer 2 framesC、indicate destination as a connection identifierD、map to the DLCI in service internetworking

考题 You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS. Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?()A、The phones are not sending traffic with the correct DSCP value.B、The Cisco CallManager is not marking the traffic correctly.C、This is most likely a bug on the CE routers.D、Your LAN QoS is incorrectly configured.

考题 Which service does the ERX Edge Router support with a virtual router?( )A、voice over IPB、wholesale servicesC、IP quality of serviceD、SNMP management

考题 Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.  What should you do first?()A、In a command window, type the ipconfig /displaydns command.B、In the Network and Sharing Center window, click the View Full Map link.C、In the Network and Sharing Center window, click the Diagnose and repair link.D、Configure the DNS server by using an IP address provided by your Internet Service Provider (ISP).

考题 Your network consists of Windows XP computers in a single Active Directory directory service   domain. All computers are located in a single Active Directory site. You need to design and deploy a new  Group Policy object (GPO) that automatically installs a custom application on computers.  What are two possible ways to achieve this goal?()A、 Link the GPO to the domain and assign the application.B、 Link the GPO to the site and assign the application.C、 Link the GPO to the domain and publish the application.D、 Link the GPO to the site and publish the application.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

考题 You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the Internet. Your company’s network also includes a third party VPN server that is accessible from the Internet. You dial in to your Internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view //server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do?()A、Stop and then start the TCP/IP NetBIOS helper service on your computer.B、Stop and then start the DNS client service on your computer.C、Add a HOSTS entry for server1 to your computer.D、Add a LMHOSTS entry for server1 to your computer.

考题 多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider

考题 单选题You are about to design a very fast convergence time on a service provider network. Which feature wouldyou utilize to declare a link failure within less than two seconds of the fault on a link?()A fast convergence SFPB MTU discoveryC redundancy linksD keepaliveE carrier delay

考题 多选题Which two options are benefits of the Cisco Software Support?()ASupports your risk mitigation planBIncrease the performance of the current featuresCExpedites the delivery of replacement hardwareDExtends the life of Cisco Devices with Software Updates

考题 单选题Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.  What should you do first?()A In a command window, type the ipconfig /displaydns command.B In the Network and Sharing Center window, click the View Full Map link.C In the Network and Sharing Center window, click the Diagnose and repair link.D Configure the DNS server by using an IP address provided by your Internet Service Provider (ISP).

考题 多选题Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()AUpgrade your residential broadband service to at least 768kbps uplink.BSwitch your home router to use PPP encapsulation.CUse the ip tcp adjust-mss interface command.DEmploy QoS techniques to drop large data packets.EUse traffic shaping to interrupt large data packets.

考题 多选题When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()ALayer 2 access link QoS designBenterprise-to-service-provider mapping modelsCLayer 3 link access QoS designDservice provider service level agreementsELayer 2 link access load balancing

考题 多选题Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)Aalways for LNSBalways for LACCLAC with fragmentation in the tunnelDLNS when there are greater than 2000 sessions