网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Why is QoS important in a converged network?()

  • A、Because data does not need to arrive intact, so data transfer rates can be variable
  • B、Because lost voice-data packets must be retransmitted
  • C、Because voice data packets should arrive quickly and sequentially, and with no lost data
  • D、Because voice data packets must follow a single dedicated path through the network

参考答案

更多 “Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network” 相关考题
考题 What ensures that voice packets are given priority throughout the network so that conversations arrive intact?() A.CentrexB.Packet encryptionC.Intelligent call routingD.QoS

考题 Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

考题 Which two statements are true about voice packets in a LAN? (Choose two.)  ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

考题 Why is QoS important in a converged network?()A、Because voice data packets must follow a single dedicated path through the networkB、Because voice data packets should arrive quickly and sequentially, and with no lost dataC、Because lost voice-data packets must be retransmittedD、Because data does not need to arrive intact, so data transfer rates can be variable

考题 What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()A、CentrexB、Packet encryptionC、Intelligent call routingD、QoS

考题 Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()A、 Packets can arrive out of order.B、 Packets must take the same path to the destination.C、 Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.D、 Packets can experience varying delays across the network.E、 Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

考题 VOIP is being implemented in the Company network and you need to assess the need for QoS.   Which of the following network problems would indicate a need to implement QoS features?()A、Mis-routed packets  B、Excess jitterC、Delay of critical trafficD、Packet loss due to congestionE、Data link layer broadcast stormsF、FTP connections unsuccessful

考题 A data file became corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、flash back all the tables in the data file, one by oneB、restore the data file to a new location and perform a media recoveryC、flash back the database; there is no need to restore the data fileD、restore the data file from the most recent backup and flash back the database

考题 VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  B、 Voice traffic data flow involves large volumes of large packets.  C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. E、 Voice packets are very sensitive to delay and jitter. 

考题 When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()A、the number of packets that are discarded because they exceed the maximum packet size of the mediumB、errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.C、the number of packets that are discarded because they are smaller than the minimum packet size of the mediumD、the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffersE、the number of times that the interface requested another interface within the router to slow down

考题 Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

考题 What are two major sources of delay that can be managed by QoS in voice-enabled networks?()A、propagation delayB、voice packet serialization delayC、congested egress queuesD、header overheadE、packets dropped because of CRC errors

考题 What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()A、QoSB、CentrexC、Packet encryptionD、Intelligent call routing

考题 Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

考题 In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A、Complete Recovery with online redo logB、Complete Recovery with archived redo logC、Tablespace Point-in-Time Recovery (TSPITR)D、Incomplete Recovery with system change number (SCN)

考题 A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、 Flash back all the tables in the data file, one by one.B、 Restore the data file to a new location and perform a media recovery.C、 Flash back the database, there is no need to restore the data file.D、 Restore the data file from the most recent backup and flash the database.

考题 The user SCOTT executes the following command successfully to increase the salary values in one of his sessions:  SQL UPDATE emp SET sal=sal*1.15 WHERE deptno=20;  Before SCOTT ends the transaction, user HR who has the privileges on EMP table executes a query to fetch the salary details but finds the old salary values instead of the increased values. Why does HR still see the old data?()A、because of redo data from redo log fileB、because of data from database buffer cacheC、because of data from a temporary tablespaceD、because of undo data from the undo tablespace

考题 单选题Why is QoS important in a converged network?()A Because data does not need to arrive intact, so data transfer rates can be variableB Because lost voice-data packets must be retransmittedC Because voice data packets should arrive quickly and sequentially, and with no lost dataD Because voice data packets must follow a single dedicated path through the network

考题 多选题Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()APackets can arrive out of order.BPackets must take the same path to the destination.COnce packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.DPackets can experience varying delays across the network.EPackets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

考题 多选题Which three practices are important to the implementation of a DiffServ QoS architecture?()ABecause services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.BTraffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.CTraffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.DTraffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.EBased upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.FQoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

考题 单选题When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()A the number of packets that are discarded because they exceed the maximum packet size of the mediumB errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.C the number of packets that are discarded because they are smaller than the minimum packet size of the mediumD the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffersE the number of times that the interface requested another interface within the router to slow down

考题 单选题Why is QoS important in a converged network?()A Because voice data packets must follow a single dedicated path through the networkB Because voice data packets should arrive quickly and sequentially, and with no lost dataC Because lost voice-data packets must be retransmittedD Because data does not need to arrive intact, so data transfer rates can be variable

考题 单选题A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A  Flash back all the tables in the data file, one by one.B  Restore the data file to a new location and perform a media recovery.C  Flash back the database, there is no need to restore the data file.D  Restore the data file from the most recent backup and flash the database.

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

考题 多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

考题 单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas.  Which method must you use to recover the lost data?()A  Complete Recovery with online redo logB  Complete Recovery with archived redo logC  Tablespace Point-in-Time Recovery (TSPITR)D  Incomplete Recovery with system change number (SCN)

考题 单选题A consultant has been asked to do a performance analysis on a database server.  Which subsystem should the consultant first analyze and why?()A CPU,because the database replication process requires a considerable amount of CPU timeB Memory,because the buffer cache requires a large amount of memory to maintain the data in system memoryC Disk,because it is important to configure a sufficient number of disks to match the CPU processing powerD Network,because the data returned to the client from the server can be a large subset of the total database