Test4actual help you pass any IT exam




Exam : Cisco 642-845


Title : ONT Optimizing Converged Cisco Networks




Updat...
Test4actual help you pass any IT exam



1. Which two QoS statements are true about the use of the SDM QoS wizard? (Choose...
Test4actual help you pass any IT exam
D. The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
...
Test4actual help you pass any IT exam
6. Which two statements are true about the implementation of QoS? (Choose two.)

A. ...
Test4actual help you pass any IT exam
B. G.728, LDCELP

C. G.729, CS-ACELP

D. G.729A, CS-ACELP

Answer: A




9. Voice ac...
Test4actual help you pass any IT exam
Answer: D




11. Two sites are using a multisite centralized call processing model....
Test4actual help you pass any IT exam
B. On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/...
Test4actual help you pass any IT exam
C. Processing delay depends on various factors, which include CPU speed, CPU utiliza...
Test4actual help you pass any IT exam




A. LEAP

B. EAP-FAST

C. PEAP

D. EAP-TLS

Answer: A




17. What are three secu...
Test4actual help you pass any IT exam
AP to shut down the entire Basic Service Set (BSS) for one minute.

F. WPA is suscep...
Test4actual help you pass any IT exam


20. Interface congestion is causing drops in voice packets and TCP packets. The dr...
Test4actual help you pass any IT exam
D. RSVP enables the DiffServ model to provide end-to-end QoS.

E. The DiffServ model...
Test4actual help you pass any IT exam


25. Which two statements are true about the digital audio in a VoIP network? (Choo...
Test4actual help you pass any IT exam
D. Calls between analog phones that are attached to the FXS ports in a VoIP network ...
Test4actual help you pass any IT exam
B. packetization

C. quantization

D. serialization

Answer: AC




31. Which three ...
Test4actual help you pass any IT exam
33. Which two statements about the DiffServ model are true? (Choose two.)

A. A clas...
Test4actual help you pass any IT exam
B. Data-link switching (DLSw)

C. Route Processor Redundancy (RPR)

D. Frame Relay (...
Test4actual help you pass any IT exam
D. WEP is a scalable encryption solution that uses static keys for authentication.

...
Test4actual help you pass any IT exam
days.

Answer: AB




40. What best describes an FXO interface?

A. analog trunks th...
Test4actual help you pass any IT exam
C. Apply the service policy on the physical interface but do not use the qos pre-cla...
Test4actual help you pass any IT exam
45. What is the goal of QoS in a network?

A. prevent packets from being dropped

B....
Test4actual help you pass any IT exam
E. UDP not supported

Answer: B




48. Which three statements are true about the ap...
Test4actual help you pass any IT exam
A. Determine a minimum bandwidth guarantee.

B. Determine interfaces to which to app...
Test4actual help you pass any IT exam
F. Voice traffic requires the retransmission capabilities of TCP whereas video uses ...
Test4actual help you pass any IT exam
(Choose three.)

A. involution

B. encoding

C. sampling

D. quantization

E. compre...
Test4actual help you pass any IT exam
Answer: D




58. Which two statements are true about the Wi-Fi Protected Access (WP...
Test4actual help you pass any IT exam
Auto-Discovery phase.

B. On Catalyst switches, the show auto qos command is used to...
Test4actual help you pass any IT exam
E. Employees are watching videos over the Internet.

F. Header compression is not be...
Test4actual help you pass any IT exam


65. What are three of the functions that AutoQoS performs when it is configured on...
Test4actual help you pass any IT exam
D. WDS

E. WLSE-Express

Answer: AC




68. What are two features of WLSE-Express wi...
Test4actual help you pass any IT exam
70. After logging into the WCS wireless management server, the administrator is pres...
Test4actual help you pass any IT exam


72. Which two statements about the open and shared key wireless-authentication met...
Test4actual help you pass any IT exam
C. Voice gateways with Cisco Unified CallManager Express (CME) can permanently act a...
Test4actual help you pass any IT exam
A. The seventh call is routed via the PSTN.

B. The call is denied and the original ...
Test4actual help you pass any IT exam
D. Survivable Remote Site Telephony (SRST)

E. Cisco Unified CallManager Express (CM...
Test4actual help you pass any IT exam




A. The voice packet will be transmitted first, followed by the FTP packet in its...
Test4actual help you pass any IT exam
F. session initiation protocol (SIP)

Answer: AEF




83. Refer to the exhibit. What...
Test4actual help you pass any IT exam
B. Cisco IOS gateways provide services such as bandwidth management and accounting.
...
Test4actual help you pass any IT exam
Answer: F




87. Refer to the exhibit. What QoS model should be used to reserve the...
Test4actual help you pass any IT exam
D. RTP is used to provide resource reservation for the voice stream.

E. UDP provide...
Test4actual help you pass any IT exam
outbound interface

B. the time it takes for a packet to propagate from source to de...
Test4actual help you pass any IT exam
A. Telnet traffic originating from the router will be rate limited unless it is dest...
Test4actual help you pass any IT exam
Answer: C




96. How does weighted random early detection (WRED) prevent packet los...
Test4actual help you pass any IT exam
C. Give TCP packets priority over UDP packets.

D. Use control plane policing for cR...
Test4actual help you pass any IT exam




A. It limits the total bandwidth available on the Frame Relay link.

B. It provi...
Test4actual help you pass any IT exam
102. Refer to the exhibit. The network has been configured with H.323 gateways and g...
Test4actual help you pass any IT exam
D. send a location request to the remote gatekeeper

Answer: A




104. What is the ...
Test4actual help you pass any IT exam
D. There is no differentiated drop mechanism. Higher priority traffic is dropped in ...
Test4actual help you pass any IT exam
E. The 802.1Q standard uses a three bit field referred to as the user priority bits ...
Test4actual help you pass any IT exam
111. Refer to the exhibit. The router receives an Ethernet frame that contains an IP...
Test4actual help you pass any IT exam
byte only appears in the inner IP header.

B. The ToS byte is copied to the outer he...
Test4actual help you pass any IT exam




A. P,S,T,U

B. U,T,S,P

C. S,U,P,T

D. P,U,S,T

E. S,P,U,T

F. S,P,T,U

Answer: ...
Test4actual help you pass any IT exam
F. performs signaling and device control

Answer: DEF




116. Refer to the exhibit....
Test4actual help you pass any IT exam




A. Implement traffic policing on the ISP routers.

B. Prioritize traffic on cust...
Test4actual help you pass any IT exam


119. A network administrator noticed that a router has been experiencing abnormall...
Test4actual help you pass any IT exam
B. The access points (APs) collect and aggregate the received-signal-strength-indica...
Test4actual help you pass any IT exam
B. first-in, first-out (FIFO)

C. best-effort

D. CBWFQ

E. IntServ

F. DiffServ

An...
Test4actual help you pass any IT exam
E. The flow-based approach is scalable to large implementations, such as the public ...
Test4actual help you pass any IT exam


126. Refer to the exhibit. On the basis of the information in the exhibit, where i...
Test4actual help you pass any IT exam
F. LWAPP encapsulation occurs between the wired switch and the wireless LAN controll...
Test4actual help you pass any IT exam
A. R1(config)# dial-peer voice 1 pots

R1(config-dial-peer)# destination-pattern 111...
Test4actual help you pass any IT exam
R1(config-dial-peer)# session target ipv4:10.1.1.1

B. R1(config)# dial-peer voice 2...
Test4actual help you pass any IT exam
A. MGCP

B. RTCP

C. SQLnet

D. Citrix

E. H.323

Answer: AE




131. Which two meth...
Test4actual help you pass any IT exam
Answer: D




133. Which three benefits are realized by implementing Wireless LAN So...
Test4actual help you pass any IT exam
B. command-line interface (CLI)

C. Wireless Control System (WCS)

D. TFTP

E. an HT...
Test4actual help you pass any IT exam




A. Wireless clients are required to be WMM/802.11e compliant to use WLAN ID 1.

...
Test4actual help you pass any IT exam
F. Voice and call signaling traffic will be considered real-time.

Answer: EF




13...
Test4actual help you pass any IT exam
any given time?

A. Call Management Link Agent

B. Traffic policing

C. Call Admissi...
Test4actual help you pass any IT exam
the voice data stream.

D. Common channel signaling uses one of the TDM channels to ...
Test4actual help you pass any IT exam




A. A provider MPLS network will utilize IP precedence, CoS or EXP bits to provid...
Test4actual help you pass any IT exam
E. In the implementation of link efficiency mechanisms on links that typically trans...
Test4actual help you pass any IT exam
Step 3: encoding

D. Step 1: sampling

Step 2: quantization

Step 3: encoding

Answe...
Test4actual help you pass any IT exam




A. SDMVoice-FastEthernet0/1

B. SDMSignal-FastEthernet0/1

C. SDMTrans-FastEther...
Test4actual help you pass any IT exam
A. Traffic to be policed is identified using the control-plane global configuration ...
Test4actual help you pass any IT exam




A. Bandwidth allocation is set to default values.

B. This QoS policy will be ap...
Test4actual help you pass any IT exam
153. Refer to the exhibit. Wireless security is based on IEEE 802.1x with WPA. Which...
Test4actual help you pass any IT exam
D. Client traffic will be encrypted by TKIP.

E. Client authentication uses PSK.

An...
Test4actual help you pass any IT exam
157. Refer to the exhibit. Which two statements are true about the table that is dis...
Test4actual help you pass any IT exam
B. platinum, gold, silver, and bronze

C. titanium, gold, silver, and bronze

D. voi...
Test4actual help you pass any IT exam
E. voice, video, best effort, and background

F. voice, video, best effort, backgrou...
Test4actual help you pass any IT exam
are shown. Which statement is correct about the QoS requirements for the campus and ...
Test4actual help you pass any IT exam
C. header compression

D. increasing link capacity

Answer: D




164. Drop




165....
Test4actual help you pass any IT exam




166. Drop




167. Drop




| English | Chinese(Traditional) | Chinese(Simplifie...
Test4actual help you pass any IT exam




168. Drop




169. Drop




170. Drop

| English | Chinese(Traditional) | Chines...
Test4actual help you pass any IT exam




171. Exhibit.




172. Exhibit.




| English | Chinese(Traditional) | Chinese(S...
Test4actual help you pass any IT exam




| English | Chinese(Traditional) | Chinese(Simplified) | Japan   86   Test4auctu...
Test4actual help you pass any IT exam




| English | Chinese(Traditional) | Chinese(Simplified) | Japan   87   Test4auctu...
Test4actual help you pass any IT exam




173. Hotspot




| English | Chinese(Traditional) | Chinese(Simplified) | Japan ...
Test4actual help you pass any IT exam




| English | Chinese(Traditional) | Chinese(Simplified) | Japan   89   Test4auctu...
Test4actual help you pass any IT exam




| English | Chinese(Traditional) | Chinese(Simplified) | Japan   90   Test4auctu...
Test4actual help you pass any IT exam




174. Drop




| English | Chinese(Traditional) | Chinese(Simplified) | Japan   9...
Upcoming SlideShare
Loading in …5
×

download here

666 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
666
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

download here

  1. 1. Test4actual help you pass any IT exam Exam : Cisco 642-845 Title : ONT Optimizing Converged Cisco Networks Update : v12.30 http://www.test4actual.com | English | Chinese(Traditional) | Chinese(Simplified) | Japan 1 Test4auctual Information Co., Ltd. All rights reserved.
  2. 2. Test4actual help you pass any IT exam 1. Which two QoS statements are true about the use of the SDM QoS wizard? (Choose two.) A. Business-critical traffic includes VoIP and voice signaling packets. B. SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec tunnels. C. SDM can provide QoS for real-time traffic and business-critical traffic. D. SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy. E. SDM creates a low latency queuing (LLQ) service policy with its associated classes. F. When allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps). Answer: CE 2. Which two Cisco AutoQoS interface statements are true? (Choose two.) A. AutoQoS is supported on Frame Relay multipoint subinterfaces. B. AutoQoS is supported on low-speed ATM PVCs in point-to-point subinterfaces. C. AutoQoS is supported on serial PPP and HDLC interfaces. D. AutoQoS is supported only on Frame Relay main interfaces and not on any subinterface configuration. Answer: BC 3. Which two wireless security statements are true? (Choose two.) A. A TACACS+ server is required to implement 802.1x. B. MIC protects against man-in-the-middle and replay attacks. C. The 802.1x standard provides encryption services for wireless clients. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 2 Test4auctual Information Co., Ltd. All rights reserved.
  3. 3. Test4actual help you pass any IT exam D. The AES (symmetric block cipher) is specified in the IEEE 802.11i specification. E. The IEEE 802.11i specification uses RC4 as its encryption mechanism. F. WPA requires TKIP and AES as encryption methods. Answer: BD 4. Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true? (Choose two.) A. To support fault and policy reporting, the WLSE requires a Wireless Control System (WCS). B. When WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs. C. WLSE requires the 2700 location appliance to offer location tracking. D. WLSE can locate rogue APs and automatically shut them down. E. WLSE configuration is done using the command line interface (CLI) or a WEB based template. Answer: BD 5. Which two statements are true about the function of CAC? (Choose two.) A. CAC provides guaranteed voice quality on a link. B. CAC artificially limits the number of concurrent voice calls. C. CAC is used to control the amount of bandwidth that is taken by a call on a link. D. CAC prevents oversubscription of WAN resources that is caused by too much voice traffic. E. CAC allows an unlimited number of voice calls while severely restricting, if necessary, other forms of traffic. F. CAC solves voice congestion problems by using QoS to give priority to UDP traffic. Answer: BD | English | Chinese(Traditional) | Chinese(Simplified) | Japan 3 Test4auctual Information Co., Ltd. All rights reserved.
  4. 4. Test4actual help you pass any IT exam 6. Which two statements are true about the implementation of QoS? (Choose two.) A. Implementing DiffServ involves the configuration of RSVP. B. Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices. C. Implementing IntServ involves the utilization of RSVP. D. Traffic should be classified and marked by the core network devices. E. Traffic should be classified and marked as close to the edge of the network as possible. Answer: CE 7. Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? (Choose three.) A. Over leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleaving. B. Use the service-policy command to attach a traffic flow to an interface on the router. C. Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flows. D. Use the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class map. E. Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value. F. Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified. Answer: BDF 8. Which codec standard would provide the highest voice-quality, mean opinion score (MOS)? A. G.711, PCM | English | Chinese(Traditional) | Chinese(Simplified) | Japan 4 Test4auctual Information Co., Ltd. All rights reserved.
  5. 5. Test4actual help you pass any IT exam B. G.728, LDCELP C. G.729, CS-ACELP D. G.729A, CS-ACELP Answer: A 9. Voice activity detection (VAD) suppresses the transmission of silence patterns. On average, and assuming that a link carries at least 24 calls, what percentage of total bandwidth could VAD save? A. 5 B. 15 C. 25 D. 35 E. 45 F. 55 Answer: D 10. What are the steps for configuring stateful NBAR for dynamic protocols? A. Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface. B. Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers. C. Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface. D. Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. E. Configure video streaming. Configure audio streaming. Attach the codec to an interface. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 5 Test4auctual Information Co., Ltd. All rights reserved.
  6. 6. Test4actual help you pass any IT exam Answer: D 11. Two sites are using a multisite centralized call processing model. The voice gateway on the remote branch has lost IP connectivity to its Cisco CallManager server. Which feature enables the remote gateway to take the role of the call agent during the WAN failure? A. automated alternate routing (AAR) B. Cisco CallManager Attendant Console C. real-time protocol (RTP) D. Survivable Remote Site Telephony (SRST) Answer: D 12. Refer to the exhibit. Both routers have been configured as VoIP gateways. They must also support traditional telephony devices to connect to analog telephones. Which two configuration changes would correctly support the voice requirements? (Choose two.) A. On each router, under the dial-peer voice 1 pots configuration, add the port fa0/0 command. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 6 Test4auctual Information Co., Ltd. All rights reserved.
  7. 7. Test4actual help you pass any IT exam B. On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/0 command. C. On each router, configure dial-peer voice 1 as a voip connection and configure dial-peer voice 2 as a pots connection. D. Under the dial-peer voice 1 pots configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router. E. Under the dial-peer voice 2 voip configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router. F. Under the dial-peer voice 2 voip configuration, change the destination target address of 10.2.2.2 to 10.1.1.1 on the R1 router, and the destination target address of 10.1.1.1 to 10.2.2.2 on the R2 router. Answer: BE 13. To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used? (Choose two.) A. class-based weighted fair queuing (CBWFQ) B. low latency queuing (LLQ) C. priority queuing (PQ) or custom queuing (CQ) D. Real-Time Transport Protocol (RTP) header compression E. TCP header compression F. UDP header compression Answer: BD 14. Which three statements about end-to-end delay are true? (Choose three.) A. End-to-end delay is the sum of propagation delays, processing delays, serialization delays, and queuing delays. B. Coast-to-coast end-to-end delay over an optical link is about 20 ms. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 7 Test4auctual Information Co., Ltd. All rights reserved.
  8. 8. Test4actual help you pass any IT exam C. Processing delay depends on various factors, which include CPU speed, CPU utilization, IP switching mode, and router architecture. D. Propagation and serialization delays are related to the media. E. Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps). F. Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface. Answer: ACD 15. What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? (Choose three.) A. EAP-FAST has the ability to tie login with non-Microsoft user databases. B. EAP-TLS supports static passwords. C. PEAP supports one-time passwords. D. LEAP does not support multiple operating systems. E. LEAP supports Layer 3 roaming. F. PEAP does not work with WPA. Answer: ACE 16. Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) uses this authentication process? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 8 Test4auctual Information Co., Ltd. All rights reserved.
  9. 9. Test4actual help you pass any IT exam A. LEAP B. EAP-FAST C. PEAP D. EAP-TLS Answer: A 17. What are three security problems with Wi-Fi Protected Access (WPA)? (Choose three.) A. WPA is based on the outdated IEEE 802.11i standard. B. WPA uses RSN, which uses the same base encryption algorithm as RC4. C. WPA requires a hardware upgrade that may not be supported by all vendors. D. WPA uses TKIP, which uses the same base encryption algorithm as WEP. E. WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs, forcing the | English | Chinese(Traditional) | Chinese(Simplified) | Japan 9 Test4auctual Information Co., Ltd. All rights reserved.
  10. 10. Test4actual help you pass any IT exam AP to shut down the entire Basic Service Set (BSS) for one minute. F. WPA is susceptible to a security weakness when preshared keys are used. Answer: DEF 18. Which two steps are executed in the deployment of Cisco AutoQoS for Enterprise? (Choose two.) A. The customer uses SNMP statistics to create the policy. B. QoS policy templates are generated and installed on the interface. C. RTP is used to generate the policy. D. LLQ, cRTP, and LFI are used to automatically discover the policy. E. The auto-generated policy is manually optimized before implementation. F. Auto-discovery is used to determine what traffic is on the interface. Answer: BF 19. Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces? (Choose three.) A. policy routing B. increase link capacity C. WRED D. CBWFQ E. LFI F. WFQ Answer: BCD | English | Chinese(Traditional) | Chinese(Simplified) | Japan 10 Test4auctual Information Co., Ltd. All rights reserved.
  11. 11. Test4actual help you pass any IT exam 20. Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems? (Choose two.) A. CBWFQ B. LLQ C. traffic shaping D. WRED Answer: BD 21. What form of AutoQoS is supported on Cisco Catalyst 2950 switches with the Enhanced Image? A. AutoQos Enterprise B. AutoQoS Campus C. AutoQoS VoIP D. AutoQoS LAN Answer: C 22. Which two statements about the DiffServ QoS model are true? (Choose two.) A. DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS. B. Network traffic is identified by class, and the level of service is chosen for each class. C. The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 11 Test4auctual Information Co., Ltd. All rights reserved.
  12. 12. Test4actual help you pass any IT exam D. RSVP enables the DiffServ model to provide end-to-end QoS. E. The DiffServ model is more scalable than the IntServ model. F. The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet. Answer: BE 23. Which two statements are true about the various methods of implementing QoS? (Choose two.) A. Cisco AutoQoS can be used repeatedly to apply a single QoS policy to multiple interfaces. B. Cisco AutoQoS includes an optional web-based GUI for automating the configuration of QoS services. C. Cisco AutoQoS provides capabilities to automate VoIP deployments. D. The auto qos global configuration command is used to configure Cisco AutoQoS. E. The Modular QoS CLI (MQC) is the best way to fine tune QoS configurations. F. The SDM QoS wizard is the fastest way to implement QoS. Answer: CE 24. Which two statements are true about analog to digital conversion of voice signals for use in digital telephony networks? (Choose two.) A. The three required steps in the analog to digital conversion are sampling, encoding, and compression. B. The three required steps in the analog to digital conversion are sampling, quantization, and compression. C. The three required steps in the analog to digital conversion are sampling, quantization, and encoding. D. The output of the sampling process is a pulse code modulation (PCM) signal. E. The output of the sampling process is a pulse amplitude modulation (PAM) signal. Answer: CE | English | Chinese(Traditional) | Chinese(Simplified) | Japan 12 Test4auctual Information Co., Ltd. All rights reserved.
  13. 13. Test4actual help you pass any IT exam 25. Which two statements are true about the digital audio in a VoIP network? (Choose two.) A. Standard encoding techniques create an uncompressed digital data rate of 4000 bps. B. Standard encoding techniques create an uncompressed digital data rate of 8000 bps. C. Standard encoding techniques create an uncompressed digital data rate of 64,000 bps. D. Voice quality is not a concern if compression is not used. E. Two methods of quantization are linear and logarithmic. F. Two methods of compression are u-law and a-law . Answer: CE 26. Which statement is true about Foreign Exchange Station (FXS) ports on a router? A. The FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN's) central office. B. The FXS interface connects directly to a standard telephone, fax machine, or similar device and supplies ring, voltage, and dial tone. C. The FXS interface connects directly to an IP phone and supplies ring, voltage, and dial tone. D. The FXS interface connects directly to ISDN voice channels. Answer: B 27. Which two statements are true about voice ports on a router? (Choose two.) A. Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports. B. Calls to the PSTN can be made via FXS or T1/E1 trunk ports. C. Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 13 Test4auctual Information Co., Ltd. All rights reserved.
  14. 14. Test4actual help you pass any IT exam D. Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers. Answer: AD 28. What are two major sources of delay that can be managed by QoS in voice-enabled networks? (Choose two.) A. propagation delay B. voice packet serialization delay C. congested egress queues D. header overhead E. packets dropped because of CRC errors Answer: CD 29. Which statement is true about a distributed call control environment and the processing of dialed digits from an IP phone? A. The router that is directly connected to the IP phone will look up the called number in its call routing table. B. The router that is directly connected to the IP phone will inform its call agent when a service request is detected. C. When the IP phone is picked up, the IP phone initiates the service request. D. The directly connected router passes the collected digits to its call agent, and the call agent looks up in its call- routing table the called number. Answer: A 30. What are two steps that are taken when a router converts a voice signal from analog to digital form? (Choose two.) A. sampling | English | Chinese(Traditional) | Chinese(Simplified) | Japan 14 Test4auctual Information Co., Ltd. All rights reserved.
  15. 15. Test4actual help you pass any IT exam B. packetization C. quantization D. serialization Answer: AC 31. Which three pieces of information are used to calculate the total bandwidth of a VoIP call? (Choose three.) A. the packetization size B. the serialization of the interface C. the quantization D. the packet rate E. the UDP overhead F. the TCP overhead Answer: ADE 32. Which statement is true about the configuration of AutoQoS on a Frame Relay interface? A. AutoQoS can be configured from a different subinterface if the DLCI is already assigned to one subinterface. B. Multilink PPP (MLP) over Frame Relay must be manually configured on low speed DLCIs. C. For low-speed Frame Relay DLCIs with Frame Relay-to-ATM Interworking, the AutoQoS cannot be configured if a virtual template is already configured for the DLCI. D. AutoQoS can be configured on a Frame Relay DLCI only if a map class is attached to the DLCI. Answer: C | English | Chinese(Traditional) | Chinese(Simplified) | Japan 15 Test4auctual Information Co., Ltd. All rights reserved.
  16. 16. Test4actual help you pass any IT exam 33. Which two statements about the DiffServ model are true? (Choose two.) A. A class can be identified as a single application, multiple applications with similar service needs, or be based on the source or destination IP addresses. B. A drawback of the DiffServ model is that it does not provide backward compatibility with devices that can only use the ToS field. C. DiffServ uses the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs). D. The DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field. E. The first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value. F. The primary goal of DiffServ is scalability. Answer: AF 34. Which three statements about classification marking of traffic at Layer 2 are true? (Choose three.) A. A Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS). B. An ATM header includes a 1-bit DE field to provide the CoS. C. An MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoS. D. The CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is used. E. In the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoS. F. In the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS. Answer: ADE 35. In which three network technologies is traffic shaping used to prevent and manage congestion? (Choose three.) A. Asynchronous Transfer Mode (ATM) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 16 Test4auctual Information Co., Ltd. All rights reserved.
  17. 17. Test4actual help you pass any IT exam B. Data-link switching (DLSw) C. Route Processor Redundancy (RPR) D. Frame Relay (FR) E. Metro Ethernet F. Multiprotocol Label Switching (MPLS) Answer: ADE 36. Which two statements about the QoS functionality of the Cisco SDM are true? (Choose two.) A. The first step when using the SDM QoS wizard is to select the inbound interface on which the QoS policy must be applied. B. The SDM QoS wizard can be used to optimize LAN, WAN, and VPN interfaces. C. The SDM QoS wizard supports network-based application recognition (NBAR) to provide deep and stateful packet inspection. D. The SDM QoS wizard will apply custom queuing and priority queuing policies to the identified interfaces. E. The SDM QoS wizard will apply low latency-queuing, custom-queuing and priority-queuing policies to the identified interfaces. F. To create and manage the QoS settings, the user must select the QoS wizard task under the Monitor option. Answer: BC 37. Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? (Choose two.) A. The two methods of authentication using the WEP encryption are open and shared key. B. The 802.11 standard defines WEP security using 128-bit keys. C. WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 17 Test4auctual Information Co., Ltd. All rights reserved.
  18. 18. Test4actual help you pass any IT exam D. WEP is a scalable encryption solution that uses static keys for authentication. E. WEP security provides only one-way authentication. F. WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism. Answer: AE 38. Which two statements about the Wireless Control System (WCS) are true? (Choose two.) A. The Cisco WCS is designed to support 1500 Cisco WLAN controllers and up to 50 APs. B. The Cisco WCS runs on a dedicated network device such as the Cisco 2700 network appliance. C. The Cisco WCS runs on various Windows and Linux platforms. D. The Cisco WCS screen displays four main menu sheet tabs consisting of Monitor, Configure, Security, and Alarm. E. The Cisco WCS uses the SNMP protocol to communicate with the controllers. Answer: CE 39. Which two statements about the Wireless Location Appliance are true? (Choose two.) A. A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers. B. Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI). C. The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances. D. The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP). E. The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 | English | Chinese(Traditional) | Chinese(Simplified) | Japan 18 Test4auctual Information Co., Ltd. All rights reserved.
  19. 19. Test4actual help you pass any IT exam days. Answer: AB 40. What best describes an FXO interface? A. analog trunks that provide the Survivable Remote Site Telephony (SRST) feature B. analog trunks that provide VoIP gateway functionality C. analog trunks that connect a gateway to plain old telephone service (POTS) device such as analog phones, fax machines, and legacy voice-mail systems D. analog trunks that connect a gateway to a central office (CO) or private branch exchange (PBX) Answer: D 41. Which two statements about the WLAN Solution Engine (WLSE) are true? (Choose two.) A. WLSE supports centralized configuration. B. WLSE supports distributed configuration. C. WLSE can pick up statistics on a device even if the device is not properly configured. D. WLSE can be used to upgrade the firmware on APs and bridges. E. WLSE monitors device fault and performance conditions but cannot report any policy misconfigurations. Answer: AD 42. A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? A. In global configuration mode, apply the service policy and use the qos pre-classify command. B. In global configuration mode, apply the service policy but do not use the qos pre-classify command. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 19 Test4auctual Information Co., Ltd. All rights reserved.
  20. 20. Test4actual help you pass any IT exam C. Apply the service policy on the physical interface but do not use the qos pre-classify command. D. Apply the service policy on the tunnel interface but do not use the qos pre-classify command. E. Apply the service policy on the tunnel interface and use the qos pre-classify command. Answer: D 43. Which QoS preclassification option will require the use of the qos pre-classify command for the VPN traffic? A. VPN traffic needs to be classified based on the Layer 2 header information. B. VPN traffic needs to be classified based on the IP precedence or DSCP. C. VPN traffic needs to be classified based on IP flow or Layer 3 information, such as source and destination IP address. D. VPN traffic with Authentication Header (AH) needs to preserve the ToS byte. Answer: C 44. To provide quality of service (QoS) for voice traffic in an IEEE 802.1q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? A. The PRI field should contain the CoS value of 010. B. The PRI field should contain the CoS value of 011. C. The PRI field should contain the CoS value of 100. D. The PRI field should contain the CoS value of 101. E. The PRI field should contain the CoS value of 110. F. The PRI field should contain the CoS value of 111. Answer: D | English | Chinese(Traditional) | Chinese(Simplified) | Japan 20 Test4auctual Information Co., Ltd. All rights reserved.
  21. 21. Test4actual help you pass any IT exam 45. What is the goal of QoS in a network? A. prevent packets from being dropped B. increase available bandwidth C. reduce hardware errors D. provide predictable network service E. eliminate propagation delay F. eliminate jitter and packet loss Answer: D 46. Which two IntServ functions are required on a router? (Choose two.) A. admission control B. DSCP classification C. monitoring D. marking E. scheduling Answer: AE 47. What is a drawback to using the IntServ model? A. RSVP that signals QoS requests per individual flow B. not scalable to large implementations C. admission control not supported D. use of dynamic port numbers | English | Chinese(Traditional) | Chinese(Simplified) | Japan 21 Test4auctual Information Co., Ltd. All rights reserved.
  22. 22. Test4actual help you pass any IT exam E. UDP not supported Answer: B 48. Which three statements are true about the application of QoS models? (Choose three.) A. The DiffServ model requires applications to signal the network with QoS requirements. B. The DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addresses. C. The DiffServ model requires RSVP. D. The best effort model is suitable for applications such as file transfer and e-mail E. The IntServ model requires applications to signal the network with QoS requirements. F. The IntServ model attempts to deliver a level of service based on the QoS specified by each packet Answer: BDE 49. What are three considerations when choosing the QoS model to deploy in a network? (Choose three.) A. the routing protocols being utilized in the network B. the applications utilizing the network C. the traffic destinations D. network addressing scheme E. cost of implementation F. the amount of the control needed of the resources Answer: BEF 50. What are two steps needed to define a QoS policy for a traffic class? (Choose two.) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 22 Test4auctual Information Co., Ltd. All rights reserved.
  23. 23. Test4actual help you pass any IT exam A. Determine a minimum bandwidth guarantee. B. Determine interfaces to which to apply policy. C. Assign priorities to the class. D. Configure access control lists. Answer: AC 51. Which three statements are true about the data traffic characteristics of voice traffic? (Choose three.) A. Latency must be kept below 150 ms. B. Latency is not a concern as long as jitter is kept below 30 ms. C. Voice packets do not require a specific type of queuing. D. Voice packets are rather small E. Voice packets require TCP for rapid retransmission of dropped packets. F. Voice packets require a fairly constant bandwidth reserved for voice control traffic as well as for the voice payload. Answer: ADF 52. Which statement is true about the comparison of voice traffic with video traffic? A. Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows. B. Latency requirements are less stringent for video traffic than for voice traffic. C. Video traffic is less sensitive to dropped packets than for voice traffic. D. Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP. E. Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 23 Test4auctual Information Co., Ltd. All rights reserved.
  24. 24. Test4actual help you pass any IT exam F. Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP. Answer: A 53. When analog signals are digitized using the G.711 codec, voice samples are encapsulated into protocol data units (PDUs) involving which three headers? (Choose three.) A. IP B. TCP C. RTP D. UDP E. H.323 F. cRTP Answer: ACD 54. Which header or set of headers does cRTP compress? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 2 and Layer 3 E. Layer 3 and Layer 4 Answer: E 55. When a router converts analog signals to digital signals, what three steps are always included in the process? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 24 Test4auctual Information Co., Ltd. All rights reserved.
  25. 25. Test4actual help you pass any IT exam (Choose three.) A. involution B. encoding C. sampling D. quantization E. compression F. companding Answer: BCD 56. Assume that network-based application recognition (NBAR) has been configured to gather traffic for all known protocols on an interface. Which command will display the statistical results of all recognized protocols? A. show ip nbar B. show ip nbar pdlm C. show ip nbar port-map D. show ip nbar protocol-discovery Answer: D 57. Which statement is true about the components of a queuing mechanism? A. Each subinterface has its own hardware queue and can experience congestion just like its main interface. B. Hardware queuing is only used if the software queues are experiencing congestion. C. Hardware queues and software queues are not used concurrently. D. The hardware queuing system always uses the FIFO queuing mechanism. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 25 Test4auctual Information Co., Ltd. All rights reserved.
  26. 26. Test4actual help you pass any IT exam Answer: D 58. Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions? (Choose two.) A. Both WPA and WPA2 require authentication support via IEEE 802.1X and Pre-Shared Key (PSK). B. Both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation. C. WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices. D. WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption. E. WPA requires encryption support via Temporal Key Integrity Protocol (TKIP). WPA2 provides encryption support via (symmetric block cipher) AES-CCMP. Answer: AE 59. Which two Cisco AutoQoS configuration statements are true? (Choose two.) A. The auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfaces. B. CEF must be enabled before configuring the auto discovery qos command. C. The auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data traffic. D. The auto qos trust command relies on NBAR to provide VoIP classification. E. The auto qos voip command configures the VoIP classification on routers and switches. Answer: BE 60. What accurately describes the usage of a Cisco AutoQoS command? A. On Catalyst switches, the show auto discovery qos command is used to display the data collected during the | English | Chinese(Traditional) | Chinese(Simplified) | Japan 26 Test4auctual Information Co., Ltd. All rights reserved.
  27. 27. Test4actual help you pass any IT exam Auto-Discovery phase. B. On Catalyst switches, the show auto qos command is used to display packet statistics of all classes that are configured for all service policies. C. On Cisco routers, the show mls qos maps command is used to verify the CoS-to-DSCP maps for egress packet queuing. D. On Cisco routers, the show auto qos command is used to display the AutoQoS interface templates, policy maps, class maps, and ACLs. Answer: D 61. Which certification-based protocol is implemented for wireless QoS between an AP and a wireless client over RF media? A. WMM using DCF B. WMM using EDCF C. 802.1e using DCF D. 802.1e using EDCF Answer: B 62. A branch office of Acme Insurance has 15 IP phones connected to the main office using the distributed call processing model. Normally, the phones work with great quality. However, during very busy times when all of the agents are on the phone at the same time, the voice quality drops precipitously. Words or phrases or both are dropped from conversations. What is the most likely cause of the problem? A. Large files are being downloaded over the WAN network. B. IP phone traffic is not being classified correctly. C. More bandwidth is required for the office LAN. D. Call Admission Control has not been implemented. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 27 Test4auctual Information Co., Ltd. All rights reserved.
  28. 28. Test4actual help you pass any IT exam E. Employees are watching videos over the Internet. F. Header compression is not being used. Answer: D 63. What are three features of voice traffic on a network? (Choose three.) A. bursty B. constant C. bandwidth intensive D. small packet sizes E. time-sensitive F. retransmittable Answer: BDE 64. A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits others in 2 ms. How would you best describe this type of problem? A. end-to-end delay B. interference from bulk data traffic C. processing delays D. serialization delays E. jitter Answer: E | English | Chinese(Traditional) | Chinese(Simplified) | Japan 28 Test4auctual Information Co., Ltd. All rights reserved.
  29. 29. Test4actual help you pass any IT exam 65. What are three of the functions that AutoQoS performs when it is configured on a switch? (Choose three.) A. synchronizes FIFO, PQ, CQ, and MDRR with WFQ, CBWFQ, and LLQ B. enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic C. enables low latency queuing to ensure that voice traffic receives priority treatment D. enforces a trust boundary on switch access ports and uplinks/downlinks E. modifies queue sizes as well as queue weights where required F. adjusts link speeds to adapt to QoS needs Answer: BDE 66. What are two components of the Cisco Autonomous WLAN solution? (Choose two.) A. WCS B. WLSE C. WLC D. WDS E. LWAPP Answer: BD 67. What are two components of the Cisco Lightweight WLAN solution? (Choose two.) A. WCS B. WLSE C. Location Appliance | English | Chinese(Traditional) | Chinese(Simplified) | Japan 29 Test4auctual Information Co., Ltd. All rights reserved.
  30. 30. Test4actual help you pass any IT exam D. WDS E. WLSE-Express Answer: AC 68. What are two features of WLSE-Express wireless management? (Choose two.) A. centralized management for autonomous access points B. centralized management for lightweight access points C. centralized management that requires an external AAA server D. centralized management with integrated AAA server E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days Answer: AD 69. What are two features of WCS wireless management? (Choose two.) A. centralized management for autonomous access points B. centralized management for lightweight access points C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days E. the inclusion of an integrated AAA server F. an external AAA-server requirement Answer: BC | English | Chinese(Traditional) | Chinese(Simplified) | Japan 30 Test4auctual Information Co., Ltd. All rights reserved.
  31. 31. Test4actual help you pass any IT exam 70. After logging into the WCS wireless management server, the administrator is presented with the initial home page showing the network summary. There are four main menu choices across the top horizontal screen. What is the purpose of the Location menu choice? A. to configure the location and addition of a Wireless LAN Controller (WLC) using an IP address B. to enable the "on demand" location of a single rogue AP or rogue client C. to configure the communication with a Location Appliance D. to configure the location and addition of a wireless access point using an IP address Answer: C 71. What is the correct procedure for adding an access point in WCS? A. Choose Configure > Access_Point, then enter the AP MAC address. B. Choose Configure > Access_Point, then enter the IP address of the AP. C. Choose Configure > Controller, then enter the IP address of the WLC. D. Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menu. E. Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu. Answer: C | English | Chinese(Traditional) | Chinese(Simplified) | Japan 31 Test4auctual Information Co., Ltd. All rights reserved.
  32. 32. Test4actual help you pass any IT exam 72. Which two statements about the open and shared key wireless-authentication methods are true? (Choose two.) A. Shared key authentication is considered more secure than open authentication. B. Shared key authentication is considered less secure than open authentication. C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data. D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data. E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data. Answer: BD 73. Which two statements best describe enhanced wireless security encryption? (Choose two.) A. TKIP protects RC4 encryption keys. B. CKIP and TKIP protect AES encryption keys. C. TKIP encryption is more processor intensive than AES encryption is. D. WPA requires TKIP encryption, whereas WPA2 supports AES encryption. E. WPA requires AES encryption, whereas WPA2 supports TKIP encryption. Answer: AD 74. Which statement is true about the capabilities of a voice gateway router? A. Voice gateways with analog interfaces need a gatekeeper to convert analog signals into digital format before voice is encapsulated into IP packets. B. Voice gateways need a gatekeeper to interconnect the VoIP networks with the PSTN network. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 32 Test4auctual Information Co., Ltd. All rights reserved.
  33. 33. Test4actual help you pass any IT exam C. Voice gateways with Cisco Unified CallManager Express (CME) can permanently act as a call agent for IP phones. D. Voice gateways equipped with a DSP module can take the role of the call agent during WAN failure. Answer: C 75. Which statement is true about the distributed call control in a VoIP network? A. The VoIP endpoints have the intelligence to set up and control calls. B. Call setup and control functionality is centralized in one call agent or cluster. C. Call setup and control resides in call agents that are distributed throughout the network. D. Each VoIP device has separate call control, voice packetization, and transport mechanisms. Answer: A 76. Using the G.729 codec and the default cRTP configuration, what is the approximate VoIP bandwidth savings across a Frame Relay link that adds a 6 byte frame header? A. 55% B. 58% C. 60% D. 63% Answer: B 77. The Acme company has determined that during its busiest hours, the average number of internal VoIP calls across the WAN link is four (4). Since this is an average, the WAN link has been sized for six (6) calls with no call admission control. What will happen when a seventh call is attempted across the WAN link? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 33 Test4auctual Information Co., Ltd. All rights reserved.
  34. 34. Test4actual help you pass any IT exam A. The seventh call is routed via the PSTN. B. The call is denied and the original six (6) calls remain. C. The call is completed and the first call is dropped. D. The call is completed, but all calls have quality issues. E. The call is completed but the seventh call has quality issues. Answer: D 78. Acme Company has offices around the country. With the use of Cisco Unified CallManager, the company has deployed a VoIP network in a multisite centralized configuration. Which IOS gateway feature should be deployed to enable VoIP devices to register with a local gateway and continue to function when the connection to the Cisco Unified CallManager is broken? A. Gatekeeper multizone B. Call Admission Control (CAC) C. Automatic Alternate Routing (AAR) D. Survivable Remote Site Telephony (SRST) Answer: D 79. Acme Company has several offices around the country. The company has deployed a VoIP network with Cisco Unified CallManager in a multisite centralized configuration but there is a requirement to place a call agent at some of the remote sites. Which IOS gateway feature should be deployed at the remote site to enable local call control? A. Gatekeeper multizone B. Call Admission Control (CAC) C. Automatic Alternate Routing (AAR) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 34 Test4auctual Information Co., Ltd. All rights reserved.
  35. 35. Test4actual help you pass any IT exam D. Survivable Remote Site Telephony (SRST) E. Cisco Unified CallManager Express (CME) Answer: E 80. Identify the link efficiency mechanism. A. LFI B. LLQ C. RSVP D. WFQ E. WRED Answer: A 81. Refer to the exhibit. A router has a 256 kbps Frame Relay circuit connected to interface serial 0/0. As a large FTP packet is being placed into the hardware transmit queue of interface serial 0/0, a voice packet is placed into the priority queue of that interface. How, and in what order, will the packets be transmitted? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 35 Test4auctual Information Co., Ltd. All rights reserved.
  36. 36. Test4actual help you pass any IT exam A. The voice packet will be transmitted first, followed by the FTP packet in its entirety. B. The voice packet will be transmitted first, followed by the fragmented FTP packet. C. The FTP packet will be fragmented and the voice packet will be interleaved. D. The FTP packet will be transmitted first in its entirety, followed by the voice packet. Answer: D 82. In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? (Choose three.) A. H.323 B. UDP C. RTP D. TCP E. Media Gateway Control Protocol (MGCP) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 36 Test4auctual Information Co., Ltd. All rights reserved.
  37. 37. Test4actual help you pass any IT exam F. session initiation protocol (SIP) Answer: AEF 83. Refer to the exhibit. What type of interface will connect the voice gateway router R1 to the analog phone and the fax machine? A. The analog phone will be connected to the FXS port, and the fax machine will be connected to the FXO port on router R1. B. The analog phone will be connected to the FXO port, and the fax machine will be connected to the FXS port on router R1. C. Both devices will be connected to the FXS ports on router R1. D. Both devices will be connected to the FXO ports on router R1. E. Both devices will be connected to the E and M ports on router R1. Answer: C 84. What type of services are provided by the Cisco IOS gateways in a VoIP network with Cisco CallManger functionality? A. Cisco IOS gateways provide services such as address translation and network access control for the devices on the network. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 37 Test4auctual Information Co., Ltd. All rights reserved.
  38. 38. Test4actual help you pass any IT exam B. Cisco IOS gateways provide services such as bandwidth management and accounting. C. Cisco IOS gateways provide media termination and signal translation between the public switched telephone network (PSTN) and IP networks. D. Cisco IOS gateways provide zone management for all registered endpoints in the network. Answer: C 85. What are two components of the QoS Integrated Services (IntServ) model? (Choose two.) A. link efficiency B. admission control C. classification and marking D. shaping and policing E. congestion avoidance using the RTP protocol F. resource reservation using the RSVP protocol Answer: BF 86. Which QoS model manages the QoS requirements for the network on a per-hop behavior (PHB) basis? A. best-effort delivery B. ingress committed rate (ICR) C. shaping and policing D. egress committed rate (ECR) E. Integrated Services (IntServ) F. differentiated services (DiffServ) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 38 Test4auctual Information Co., Ltd. All rights reserved.
  39. 39. Test4actual help you pass any IT exam Answer: F 87. Refer to the exhibit. What QoS model should be used to reserve the requested bandwidth and delay needed for each allowed VoIP call regardless of changing network conditions? A. best-effort delivery B. ingress committed rate (ICR) C. shaping and policing D. egress committed rate (ECR) E. Integrated Services (IntServ) F. differentiated services (DiffServ) Answer: E 88. Which two statements are true about the protocols that are used for transmitting voice traffic? (Choose two.) A. RTP multiplexing is used to keep multiple phone conversations separate. B. RTP provides end-to-end delivery services for voice traffic. C. UDP is used to ensure a reliable transmission from sender to receiver. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 39 Test4auctual Information Co., Ltd. All rights reserved.
  40. 40. Test4actual help you pass any IT exam D. RTP is used to provide resource reservation for the voice stream. E. UDP provides multiplexing of multiple phone conversations. Answer: BE 89. What best describes processing delay? A. the time required from receipt of the incoming frame, until the frame/packet has been queued for transmission B. the time taken for a single packet to traverse the physical medium from one end to the other C. the time taken to place a frame on the physical medium for transport D. the time spent for a packet to reside in the output queue of a router Answer: A 90. What are two reasons for packet loss on a VoIP connection? (Choose two.) A. serialization delay B. overrun C. full buffers and queues D. propagation delay E. shaping delay F. TCP header errors Answer: BC 91. What is the best description of serialization delay? A. the time it takes for a Layer 3 switch or a router to switch a packet from an inbound interface to the queue of the | English | Chinese(Traditional) | Chinese(Simplified) | Japan 40 Test4auctual Information Co., Ltd. All rights reserved.
  41. 41. Test4actual help you pass any IT exam outbound interface B. the time it takes for a packet to propagate from source to destination C. the time it takes to place a frame on the physical medium for transport D. the time a packet resides in the outbound queue of a router Answer: C 92. Which technology can be used to help prevent DoS attacks on infrastructure devices such as routers and switches? A. MAC address filtering B. control plane policing C. AAA D. SNMP E. rate-limiting Answer: B 93. Refer to the exhibit. Which statement is true? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 41 Test4auctual Information Co., Ltd. All rights reserved.
  42. 42. Test4actual help you pass any IT exam A. Telnet traffic originating from the router will be rate limited unless it is destined for hosts 10.1.1.1 or 10.1.1.2. B. The configuration will not rate limit any Telnet traffic until it is applied to a router interface. C. All Telnet traffic destined for the router will be rate limited. D. Telnet traffic from hosts 10.1.1.1 and 10.1.1.2 destined for the router will not be rate limited. Answer: D 94. What are three Cisco Unified CallManager features? (Choose three.) A. programming interface to external applications B. FXS and FXO port negotiation C. AutoQos VoIP trust boundaries D. signaling and device control E. LLQ for voice and video traffic F. directory and XML services Answer: ADF 95. What management tool could be used to provide centralized configuration, monitoring, and management in a network built on Cisco wireless LAN controllers and Lightweight APs? A. CiscoWorks Wireless LAN Solution Engine (WLSE) B. CiscoWorks Wireless LAN Solution Engine (WLSE) Express C. Cisco Wireless Control System (WCS) D. Wireless Domain Services (WDS) E. WLAN Controllers (WLC) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 42 Test4auctual Information Co., Ltd. All rights reserved.
  43. 43. Test4actual help you pass any IT exam Answer: C 96. How does weighted random early detection (WRED) prevent packet loss? A. increases link capacity B. increases buffer space to accommodate bursts of traffic from delay-sensitive applications C. provides prioritized forwarding for drop-sensitive applications D. drops lower priority packets before congestion occurs E. separates traffic into as many as 64 queues that can be uniquely prioritized Answer: D 97. What are three types of packet delays that occur in a network? (Choose three.) A. timing B. queuing C. differential D. serialization E. packetization F. propagation Answer: BDF 98. What are two ways to minimize the delay of VoIP packets that are traversing a network? (Choose two.) A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets. B. Use WFQ, CBWFQ, and LLQ to compress the payload. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 43 Test4auctual Information Co., Ltd. All rights reserved.
  44. 44. Test4actual help you pass any IT exam C. Give TCP packets priority over UDP packets. D. Use control plane policing for cRTP queuing. E. Use stacker and predictor to compress the payload. Answer: AE 99. What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? (Choose three.) A. codec B. link speed C. Layer 2 encapsulation D. packet overhead (IP/UDP/RTP) E. link delay F. total number of simultaneous calls that are allowed Answer: ACD 100. Refer to the exhibit. Which statement is true about the function of the frame-relay voice-bandwidth 24000 command that is shown in the partial configuration? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 44 Test4auctual Information Co., Ltd. All rights reserved.
  45. 45. Test4actual help you pass any IT exam A. It limits the total bandwidth available on the Frame Relay link. B. It provides call admission control by limiting the number of voice calls over the Frame Relay link. C. It sets up IP RTP Priority features that reserve bandwidth for voice traffic flows. D. It is functionally equivalent to configuring LLQ. E. It limits the bandwidth that is taken by individual voice calls to 24000 b/s. Answer: B 101. What are two reasons to implement H.323 gatekeepers? (Choose two.) A. to eliminate the need for VoIP gateways B. to scale a VoIP installation with multiple gateways C. to provide call admission control and limit the number of simultaneous calls on the network D. to meet the requirement to control H.323 gateways on a LAN E. to accept call requests and reduce the load on the gateway Answer: BC | English | Chinese(Traditional) | Chinese(Simplified) | Japan 45 Test4auctual Information Co., Ltd. All rights reserved.
  46. 46. Test4actual help you pass any IT exam 102. Refer to the exhibit. The network has been configured with H.323 gateways and gatekeepers as shown. Which statement is true when a call is placed? A. A gatekeeper is contacted to determine the correct local gateway to use. B. A gateway will receive the call and forward a call request to the local gatekeeper. C. A gateway will receive the call and forward a call request to the gatekeeper on the other side of the WAN. D. A gatekeeper will receive the call and forward a call request to the remote gateway. Answer: B 103. Refer to the exhibit. What will the H.323 gateways do when they receive a call request? A. forward an admission request to the local gatekeeper B. forward an admission request to the remote gatekeeper C. send a location request to the remote gateway | English | Chinese(Traditional) | Chinese(Simplified) | Japan 46 Test4auctual Information Co., Ltd. All rights reserved.
  47. 47. Test4actual help you pass any IT exam D. send a location request to the remote gatekeeper Answer: A 104. What is the term that is used to describe the process of converting a signal from digital to analog? A. packetization B. quantization C. decoding D. sampling Answer: C 105. Which two options can be used as traffic descriptors when classifying and marking traffic? (Choose two.) A. incoming interface B. Layer 2 differentiated services code point (DSCP) C. Layer 3 IP precedence D. outgoing interface Answer: AC 106. What are three problems with the tail drop mechanism of managing interface congestion? (Choose three.) A. Queuing introduces equal delays for packets of the same flow, resulting in jitter. B. When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again. C. All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 47 Test4auctual Information Co., Ltd. All rights reserved.
  48. 48. Test4actual help you pass any IT exam D. There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic. E. In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions. F. Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping. Answer: BCD 107. Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? (Choose two.) A. 802.1x B. Cisco Temporal Key Integrity Protocol (CKIP) C. Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) D. Cisco Message Integrity Check (CMIC) E. One-Time Passwords (OTP) F. Advanced Encryption Standard (AES) Answer: BD 108. Which two QoS classification and marking statements are true? (Choose two.) A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit. B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field. C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values. D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 48 Test4auctual Information Co., Ltd. All rights reserved.
  49. 49. Test4actual help you pass any IT exam E. The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS. Answer: BE 109. Which two pairings match the application with the correct CoS value? (Choose two.) A. CoS 0 = Best-Effort Data B. CoS 1 = Best-Effort Data C. CoS 3 = High Priority Data D. CoS 4 = High Priority Data E. CoS 5 = Voice Bearer F. CoS 7 = Voice Bearer Answer: AE 110. Which two characteristics are common between traffic policing and traffic shaping? (Choose two.) A. The rate of traffic is measured and compared to a configured policy. B. Classification is used to differentiate traffic. C. Traffic is marked and sent out according to priority. D. Both can be applied to inbound and outbound traffic. E. Both buffer traffic to ensure a predetermined traffic rate. F. Both drop traffic that is above a predetermined traffic rate. Answer: AB | English | Chinese(Traditional) | Chinese(Simplified) | Japan 49 Test4auctual Information Co., Ltd. All rights reserved.
  50. 50. Test4actual help you pass any IT exam 111. Refer to the exhibit. The router receives an Ethernet frame that contains an IP datagram of 1500 bytes. The packet will be forwarded if it conforms to the traffic policing policy that is applied outgoing on the serial interface. Using single token-bucket class-based policing, which three settings would allow the entire packet to be transmitted during time period T_c? Assume the token bucket is full of tokens. (Choose three.) A. CIR = 1.536 Mb/s, T_c = 100 msec B. CIR = 1.536 Mb/s, T_c = 10 msec C. CIR = 1.536 Mb/s, T_c = 1 msec D. CIR = 512 Kb/s, T_c = 100 msec E. CIR = 512 Kb/s, T_c = 10 msec F. CIR = 512 Kb/s, T_c = 1 msec Answer: ABD 112. Which two statements or sets of statements are true about the application of the qos pre-classify command? (Choose two.) A. If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS | English | Chinese(Traditional) | Chinese(Simplified) | Japan 50 Test4auctual Information Co., Ltd. All rights reserved.
  51. 51. Test4actual help you pass any IT exam byte only appears in the inner IP header. B. The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary. C. With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different QoS configurations on each tunnel. D. With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different QoS configurations on each interface. E. With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different QoS configurations on each interface. Answer: BC 113. Which device is normally used to translate telephone numbers or names to IP addresses for call routing in an H.323 network? A. call agent B. IP phone C. multipoint control unit D. gatekeeper Answer: D 114. Refer to the exhibit. Which option correctly describes the order of signaling and call processing events when a branch employee calls headquarters? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 51 Test4auctual Information Co., Ltd. All rights reserved.
  52. 52. Test4actual help you pass any IT exam A. P,S,T,U B. U,T,S,P C. S,U,P,T D. P,U,S,T E. S,P,U,T F. S,P,T,U Answer: C 115. Which three functions are associated with a Cisco Unified CallManager? (Choose three.) A. connects traditional telephony devices to voice over IP infrastructure B. converts analog signals to digital format C. performs voice compression D. performs call processing E. performs dial plan administration | English | Chinese(Traditional) | Chinese(Simplified) | Japan 52 Test4auctual Information Co., Ltd. All rights reserved.
  53. 53. Test4actual help you pass any IT exam F. performs signaling and device control Answer: DEF 116. Refer to the exhibit. What is the maximum available bandwidth for the path between the workstation and the server? A. 256 kb/s B. 512 kb/s C. 1 Mb/s D. 10 Mb/s E. 100 Mb/s F. 110.768 Mb/s Answer: A 117. Refer to the exhibit. What three actions can be taken to guarantee QoS for voice traffic? (Choose three.) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 53 Test4auctual Information Co., Ltd. All rights reserved.
  54. 54. Test4actual help you pass any IT exam A. Implement traffic policing on the ISP routers. B. Prioritize traffic on customer routers. C. Configure random early detection on the customer routers. D. Implement TCP/RTP header compression on the links between the customer and ISP routers. E. Implement network-based application recognition (NBAR) on the ISP routers. F. Configure low latency queuing (LLQ) on the customer routers. Answer: BDF 118. Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? (Choose two.) A. Packets can arrive out of order. B. Packets must take the same path to the destination. C. Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic. D. Packets can experience varying delays across the network. E. Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path. Answer: AD | English | Chinese(Traditional) | Chinese(Simplified) | Japan 54 Test4auctual Information Co., Ltd. All rights reserved.
  55. 55. Test4actual help you pass any IT exam 119. A network administrator noticed that a router has been experiencing abnormally high route processor CPU utilization near 100%. Such utilization cannot be explained by known traffic patterns. The network administrator determined that the router has been the target of DoS attacks. What QoS feature should be configured on the router to help protect it from DoS attacks? A. CPU Reservation Policing B. traffic shaping C. weighted RED D. Control Plane Policing Answer: D 120. Refer to the exhibit. A Wireless Location Appliance has been included in the wireless network. Which statement is true about the location calculation process performed by the Location Appliance? A. The access points (APs) collect and aggregate the received-signal-strength-indication (RSSI) information from all Wi-Fi devices on the network and send it to the Location Appliance by way of the Simple Network Management Protocol (SNMP). | English | Chinese(Traditional) | Chinese(Simplified) | Japan 55 Test4auctual Information Co., Ltd. All rights reserved.
  56. 56. Test4actual help you pass any IT exam B. The access points (APs) collect and aggregate the received-signal-strength-indication (RSSI) information from all Wi-Fi devices on the network and send it to the Location Appliance through the Lightweight Access Point Protocol (LWAPP). C. The wireless LAN controllers aggregate the received-signal-strength-indication (RSSI) information from the lightweight access points (APs) and send it to the Location Appliance by way of the Simple Network Management Protocol (SNMP). D. The wireless LAN controllers collect and aggregate the received-signal-strength-indication (RSSI) information from all Wi-Fi devices on the network and send it to the Location Appliance through the Lightweight Access Point Protocol (LWAPP). Answer: C 121. Which three options are prerequisites to configuring Cisco AutoQoS? (Choose three.) A. Cisco Express Forwarding (CEF) must be globally enabled. B. Prior to the enabling of the Cisco AutoQoS feature, the bandwidth command must be applied on all interfaces or subinterfaces. C. After the enabling of the Cisco AutoQoS feature, the bandwidth command must be applied on all interfaces or subinterfaces . D. QoS policies must be enabled on all interfaces that will participate in the AutoQoS configuration. E. An IP address must be configured on all low-bandwidth interfaces (768 kb/s or lower) that will participate in the AutoQoS configuration. F. An IP address must be configured on all interfaces that will participate in the AutoQoS configuration. Answer: ABE 122. What are the three models of quality of service (QoS) in a network? A. Resource Reservation Protocol (RSVP) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 56 Test4auctual Information Co., Ltd. All rights reserved.
  57. 57. Test4actual help you pass any IT exam B. first-in, first-out (FIFO) C. best-effort D. CBWFQ E. IntServ F. DiffServ Answer: CEF 123. Within the WMM policy, how many default QoS radio access categories are there? A. 8 B. 5 C. 4 D. 3 Answer: C 124. What is an advantage of the IntServ QoS model? A. It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked). B. RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows. C. RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers). D. Because of the stateful RSVP architecture, continuous signaling does not have to occur. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 57 Test4auctual Information Co., Ltd. All rights reserved.
  58. 58. Test4actual help you pass any IT exam E. The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow. Answer: A 125. Refer to the exhibit. The column headings A, B, and C, represent Layer 2 and 3 QoS packet marking methods. Which option correctly matches the QoS marking method with its values? A. A = 802.11e priority values, B = 802.1p priority values, C = DSCP priority values B. A = 802.11e priority values, B = DSCP priority values, C = 802.1p priority values C. A = 802.1p priority values, B = 802.11e priority values, C = DSCP priority values D. A = 802.1p priority values, B = DSCP priority values, C = 802.11e priority values E. A = DSCP priority values, B = 802.1e priority values, C = 802.11p priority values F. A = DSCP priority values, B = 802.1p priority values, C = 802.11e priority values Answer: F | English | Chinese(Traditional) | Chinese(Simplified) | Japan 58 Test4auctual Information Co., Ltd. All rights reserved.
  59. 59. Test4actual help you pass any IT exam 126. Refer to the exhibit. On the basis of the information in the exhibit, where is LWAPP encapsulation implemented? A. LWAPP encapsulation occurs between the WLAN access point and the wireless clients. B. LWAPP encapsulation occurs between the wireless LAN controller and the wireless clients. C. LWAPP encapsulation occurs between the wired switch and the wireless clients. D. LWAPP encapsulation occurs between the wireless LAN controller and the WLAN access point. E. LWAPP encapsulation occurs between the wired switch and the WLAN access point. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 59 Test4auctual Information Co., Ltd. All rights reserved.
  60. 60. Test4actual help you pass any IT exam F. LWAPP encapsulation occurs between the wired switch and the wireless LAN controller. Answer: D 127. Refer to the exhibit. What is the configuration an example of? A. enabling modular QoS over Frame Relay B. enabling Real-Time Transport Protocol (RTP) header compression C. enabling distributed compressed Transmission Control Protocol D. enabling latency and jitter reduction for Transmission Control traffic E. enabling TCP header compression Answer: E 128. Refer to the exhibit. Routers R1 and R2 are to be configured as VoIP gateways. On the basis of the information in the exhibit, which dial peer configuration would be valid? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 60 Test4auctual Information Co., Ltd. All rights reserved.
  61. 61. Test4actual help you pass any IT exam A. R1(config)# dial-peer voice 1 pots R1(config-dial-peer)# destination-pattern 1111 R1(config-dial-peer)# port 1/0/0 B. R1(config)# dial-peer voice 1 voip R1(config-dial-peer)# destination-pattern 1111 R1(config-dial-peer)# port 1/0/0 C. R2(config)# dial-peer voice 1 pots R2(config-dial-peer)# destination-pattern 1111 R2(config-dial-peer)# port 1/0/0 D. R2(config)# dial-peer voice 1 voip R2(config-dial-peer)# destination-pattern 1111 R2(config-dial-peer)# port 1/0/0 Answer: A 129. Refer to the exhibit. Routers R1 and R2 are to be configured as VoIP gateways. On the basis of the information in the exhibit, which dial peer configuration would be valid? A. R1(config)# dial-peer voice 2 pots R1(config-dial-peer)# destination-pattern 1111 | English | Chinese(Traditional) | Chinese(Simplified) | Japan 61 Test4auctual Information Co., Ltd. All rights reserved.
  62. 62. Test4actual help you pass any IT exam R1(config-dial-peer)# session target ipv4:10.1.1.1 B. R1(config)# dial-peer voice 2 voip R1(config-dial-peer)# destination-pattern 1111 R1(config-dial-peer)# session target ipv4:10.1.1.1 C. R2(config)# dial-peer voice 2 pots R2(config-dial-peer)# destination-pattern 1111 R2(config-dial-peer)# session target ipv4:10.1.1.1 D. R2(config)# dial-peer voice 2 voip R2(config-dial-peer)# destination-pattern 1111 R2(config-dial-peer)# session target ipv4:10.1.1.1 Answer: D 130. Refer to the exhibit. A portion of the template that was generated on a Cisco router by AutoQoS is displayed. Which two signaling protocols are classified? (Choose two.) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 62 Test4auctual Information Co., Ltd. All rights reserved.
  63. 63. Test4actual help you pass any IT exam A. MGCP B. RTCP C. SQLnet D. Citrix E. H.323 Answer: AE 131. Which two methods are available for modifying the active Cisco AutoQoS configuration on a router? (Choose two.) A. TFTP in ROM Monitor mode B. QoS Policy Manager (QPM) C. Security Device Manager (SDM) D. command-line interface (CLI) Answer: BD 132. What is the maximum number of access points that can be supported from a single Wireless LAN Solution Engine (WLSE) console? A. 1000 B. 1500 C. 2000 D. 2500 E. 3000 F. 3500 | English | Chinese(Traditional) | Chinese(Simplified) | Japan 63 Test4auctual Information Co., Ltd. All rights reserved.
  64. 64. Test4actual help you pass any IT exam Answer: D 133. Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)? (Choose three.) A. improved WLAN security B. simplified AP deployment C. dynamic RF management D. on-demand location of rogue APs E. system-wide control of status and alarm monitoring F. automatic channel and power level adjustment Answer: ABC 134. When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible? A. 1 meter B. 5 meters C. 10 meters D. 25 meters E. 33 meters Answer: C 135. Which three user interfaces exist for the Cisco WLAN Controllers? (Choose three.) A. Wireless LAN Solution Engine (WLSE) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 64 Test4auctual Information Co., Ltd. All rights reserved.
  65. 65. Test4actual help you pass any IT exam B. command-line interface (CLI) C. Wireless Control System (WCS) D. TFTP E. an HTTPS web user interface F. an HTTP web user interface Answer: BCE 136. End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p? A. IP precedence B. type of service (ToS) C. class of service (CoS) D. differentiated services code point (DSCP) Answer: D 137. Refer to the exhibit. What can be concluded based upon the displayed settings in this page of the wireless controller graphical user interface? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 65 Test4auctual Information Co., Ltd. All rights reserved.
  66. 66. Test4actual help you pass any IT exam A. Wireless clients are required to be WMM/802.11e compliant to use WLAN ID 1. B. QoS service is offered to WMM/802.11e capable wireless clients and default QoS is offered for non- WMM/802.11e wireless clients. C. WMM/802.11e QoS requests will be ignored. D. The session will time out in one hour. E. The WLAN ID is the association from the WLAN SSID to a unique administratively defined number that in turn corresponds to security policies. Answer: C 138. The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM? (Choose two.) A. Business-critical traffic will be sorted into two QoS classes. B. Real-time traffic will be sorted into one QoS class. C. Voice traffic will be considered real-time traffic while call signaling will be considered business-critical. D. All traffic except real-time will be considered best-effort. E. Routing, management, and transactional traffic will be considered business-critical. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 66 Test4auctual Information Co., Ltd. All rights reserved.
  67. 67. Test4actual help you pass any IT exam F. Voice and call signaling traffic will be considered real-time. Answer: EF 139. When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? (Choose three.) A. Voice traffic will be assigned 47% of the interface bandwidth. B. Voice call signaling will be assigned 33% of the interface bandwidth. C. Telnet, SSH, and other traffic that is generated to manage the router is assigned 5% of the interface bandwidth. D. Best-effort traffic will be assigned 38% of the interface bandwidth. E. Routing protocol traffic will be assigned 5% of the interface bandwidth. F. Transactional traffic will be assigned 5% of the interface bandwidth. Answer: CEF 140. Which statement is true about the Call Admission Control (CAC) feature in VoIP networks? A. CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network. B. CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network. C. CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate. D. In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented. Answer: B 141. What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at | English | Chinese(Traditional) | Chinese(Simplified) | Japan 67 Test4auctual Information Co., Ltd. All rights reserved.
  68. 68. Test4actual help you pass any IT exam any given time? A. Call Management Link Agent B. Traffic policing C. Call Admission Control D. QoS Link Congestion Management E. Oversubscription Link Detection Answer: C 142. Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony? (Choose two.) A. Analog phones, connected to the PSTN, act as internal call agents if IP communication to the CallManager is lost. B. An onsite gateway reroutes calls over the PSTN if IP communication to the CallManager is lost. C. The IP phones can reroute calls over the PSTN if IP communication to the CallManager is lost. D. Local voice gateways can assume the function of a call agent if IP communication to the CallManager is lost. E. IP phones use an internal call agent if IP communication to the CallManager is lost. Answer: BD 143. Which two statements are correct about the signaling methods that are utilized for transmitting voice? (Choose two.) A. Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream. B. Channel-associated signaling utilizes a separate TDM channel for transmitting control signals. C. Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for | English | Chinese(Traditional) | Chinese(Simplified) | Japan 68 Test4auctual Information Co., Ltd. All rights reserved.
  69. 69. Test4actual help you pass any IT exam the voice data stream. D. Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice. E. ISDN BRIs implement channel-associated signaling. Answer: AD 144. Which three practices are important to the implementation of a DiffServ QoS architecture? (Choose three.) A. Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services. B. Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes. C. Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information. D. Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services. E. Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets. F. QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible. Answer: CDF 145. Refer to the exhibit. An IP packet, Ethernet frame, and MPLS frame are shown. Which two statements are correct about the QoS marking relationships between them? (Choose two.) | English | Chinese(Traditional) | Chinese(Simplified) | Japan 69 Test4auctual Information Co., Ltd. All rights reserved.
  70. 70. Test4actual help you pass any IT exam A. A provider MPLS network will utilize IP precedence, CoS or EXP bits to provide QoS service through the provider network. B. QoS markings from the Ethernet frame or IP packet will be mapped to MPLS EXP bits to allow for QoS service to be continued through a provider network. C. MPLS mappings by the provider will change the IP ToS bits as a packet traverses an MPLS network. D. Some networks require Ethernet CoS bits to be mapped to IP ToS bits because end devices can only mark at Layer 3. E. Mapping CoS bits from the Ethernet frame to the IP ToS bits can be provisioned only at the edge of the provider network. Answer: BD 146. In the design of a QoS solution, which two factors should be taken into consideration? (Choose two.) A. On congested links, all forms of traffic will require some form of QoS. B. All traffic types and requirements should be examined to determine the number of traffic classes required. C. In the implementation of link efficiency mechanisms on links that typically transport relatively large packets, header compression will be most efficient. D. In the implementation of link efficiency mechanisms on links that typically transport relatively small packets, header compression will be most efficient. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 70 Test4auctual Information Co., Ltd. All rights reserved.
  71. 71. Test4actual help you pass any IT exam E. In the implementation of link efficiency mechanisms on links that typically transport relatively small packets, payload compression will be most efficient. F. Payload compression provides more available bandwidth and reduces processing delay time. Answer: BD 147. In a VoIP network, which type of interface would an analog fax machine connect to? A. Type 1 B. Type 2 C. FXS D. FXO E. E&M Answer: C 148. Which set of steps represents the correct sequence a router would take when converting an analog signal to a digital signal? A. Step 1: quantization Step 2: sampling Step 3: encoding B. Step 1: sampling Step 2: encoding Step 3: quantization C. Step 1: quantization Step 2: sampling | English | Chinese(Traditional) | Chinese(Simplified) | Japan 71 Test4auctual Information Co., Ltd. All rights reserved.
  72. 72. Test4actual help you pass any IT exam Step 3: encoding D. Step 1: sampling Step 2: quantization Step 3: encoding Answer: D 149. What is the purpose of the Control Plane Policing (CoPP) feature of a network device? A. to protect the CPU from high utilization B. to direct traffic across the control plane to its appropriate destination C. to protect the control plane against excessive legitimate IP data traffic D. to protect the control plane against DoS attacks E. to protect the route processor from resource exhaustion from legitimate IP data packets Answer: D 150. Refer to the exhibit. This QoS policy will be applied outgoing on FastEthernet0/1 interface. Which one of the following QoS classes is not enabled but will be listed in the configuration summary? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 72 Test4auctual Information Co., Ltd. All rights reserved.
  73. 73. Test4actual help you pass any IT exam A. SDMVoice-FastEthernet0/1 B. SDMSignal-FastEthernet0/1 C. SDMTrans-FastEthernet0/1 D. SDMManage-FastEthernet0/1 E. SDMRout-FastEthernet0/1 F. SDMBulk-FastEthernet0/1 Answer: F 151. Which Control Plane Policing (CoPP) statement is true? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 73 Test4auctual Information Co., Ltd. All rights reserved.
  74. 74. Test4actual help you pass any IT exam A. Traffic to be policed is identified using the control-plane global configuration command. B. The control-plane global configuration command enters the Cisco Modular QoS CLI (MQC) mode. C. The control-plane global configuration command enters the control-plane configuration mode. D. Traffic to be policed is identified using the control-plane interface configuration command. E. The control-plane interface configuration command enters the Cisco Modular QoS CLI (MQC) mode. F. The control-plane interface configuration command enters the control-plane configuration mode. Answer: C 152. Refer to the exhibit. The QoS policy will be applied outgoing on an interface. Based on the indicated bandwidth allocation, which statement is true? | English | Chinese(Traditional) | Chinese(Simplified) | Japan 74 Test4auctual Information Co., Ltd. All rights reserved.
  75. 75. Test4actual help you pass any IT exam A. Bandwidth allocation is set to default values. B. This QoS policy will be applied to an Ethernet interface. C. When traffic from an FTP session exceeds more than 25% of the outgoing bandwidth on the interface, it will be dropped. D. Voice traffic on the interface will restrict all remaining traffic to 50% of the bandwidth. E. Real Time traffic will be allocated 50% of 50000 kb/s. F. The three types of traffic must share the interface bandwidth. Answer: F | English | Chinese(Traditional) | Chinese(Simplified) | Japan 75 Test4auctual Information Co., Ltd. All rights reserved.
  76. 76. Test4actual help you pass any IT exam 153. Refer to the exhibit. Wireless security is based on IEEE 802.1x with WPA. Which three statements are true? (Choose three.) A. The access point is an EAP supplicant. B. The client is an EAP supplicant. C. Client traffic will be encrypted by an AES cryptographic algorithm. D. Client traffic will be encrypted by an RC4 cryptographic algorithm. E. The client is operating in WPA personal mode. F. The client is operating in WPA enterprise mode. Answer: BDF 154. Refer to the exhibit. Wireless security is based on IEEE 802.1x with WPA2. Which two statements are true? (Choose two.) A. The access point is an EAP authenticator. B. The client is an EAP authenticator. C. Client traffic will be encrypted by an AES cryptographic algorithm. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 76 Test4auctual Information Co., Ltd. All rights reserved.
  77. 77. Test4actual help you pass any IT exam D. Client traffic will be encrypted by TKIP. E. Client authentication uses PSK. Answer: AC 155. Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? A. Home, Configure, Location, and Monitor B. Home, Configure, Monitor, and Refresh C. Home, Monitor, Refresh, and Administration D. Monitor, Configure, Location, and Administration E. Monitor, Configure, Refresh, and Administration F. Monitor, Location, Refresh, and Administration Answer: D 156. Which two commands should be entered on a WLAN controller to remove any residual configuration? A. Enter the clear controller command followed by the reload command. B. Enter the clear controller command followed by the reset command. C. Enter the clear controller command followed by the reset system command. D. Enter the erase startup-config command followed by the reload command. E. Enter the erase startup-config command followed by the reset command. F. Enter the erase startup-config command followed by the reset system command. Answer: B | English | Chinese(Traditional) | Chinese(Simplified) | Japan 77 Test4auctual Information Co., Ltd. All rights reserved.
  78. 78. Test4actual help you pass any IT exam 157. Refer to the exhibit. Which two statements are true about the table that is displayed in the lower left hand corner? (Choose two.) A. This section is called the Alarm Monitor Area. B. This section is called the Alarm Control Area. C. This section is called the System Status Area. D. Orange alarms indicate a major alarm. E. Red alarms indicate a major alarm. F. Yellow alarms indicate no problems. Answer: AD 158. Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard? A. gold, silver, bronze, and platinum | English | Chinese(Traditional) | Chinese(Simplified) | Japan 78 Test4auctual Information Co., Ltd. All rights reserved.
  79. 79. Test4actual help you pass any IT exam B. platinum, gold, silver, and bronze C. titanium, gold, silver, and bronze D. voice and video, best effort, background, and scavenger E. voice, video, best effort, and background F. voice, video, best effort, and scavenger Answer: E 159. Which two statements about the Wi-Fi Multimedia (WMM) standard are true? (Choose two.) A. Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first. B. Packets that are not assigned to a specific access category are categorized by default as the background access category. C. The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices. D. WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved. E. WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes. Answer: DE 160. When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories? A. platinum, gold, silver, and bronze B. voice, gold, silver, and bronze C. low delay, network critical, business, best effort D. voice, video, background gold, background silver, and best effort | English | Chinese(Traditional) | Chinese(Simplified) | Japan 79 Test4auctual Information Co., Ltd. All rights reserved.
  80. 80. Test4actual help you pass any IT exam E. voice, video, best effort, and background F. voice, video, best effort, background, and scavenger Answer: A 161. Refer to the exhibit. Which two statements are correct about the implementation of QoS across the WANs that are shown? (Choose two.) A. QoS cannot be maintained across WAN A. B. The service provider is not involved in providing QoS services in WAN A. C. The service provider can provide QoS services through the cloud in WAN A. D. QoS cannot be maintained across WAN B. E. The service provider is not involved in providing QoS services in WAN B. F. The service provider can provide QoS services through the cloud in WAN B. Answer: BF 162. Refer to the exhibit. The network in the diagram has contracted with a service provider for the QoS levels that | English | Chinese(Traditional) | Chinese(Simplified) | Japan 80 Test4auctual Information Co., Ltd. All rights reserved.
  81. 81. Test4actual help you pass any IT exam are shown. Which statement is correct about the QoS requirements for the campus and remote branch? A. Because adequate levels of service are provided across the WAN, campus and remote branch QoS will not be required. B. The enterprise campus can allow no more than 90 ms of delay, 10 ms of jitter, and 0.5% loss to maintain adequate levels of QoS for voice. C. The enterprise remote branch can allow no more than 90 ms of delay, 10 ms of jitter, and 0.5% loss to maintain adequate levels of QoS for voice. D. The enterprise campus plus the remote branch can allow no more than 90 ms of delay, 10 ms of jitter, and 0.5% loss to maintain adequate levels of QoS for voice. Answer: D 163. Which of the items stated is typically the most expensive method of improving QoS across WAN links? A. advanced queuing B. data compression | English | Chinese(Traditional) | Chinese(Simplified) | Japan 81 Test4auctual Information Co., Ltd. All rights reserved.
  82. 82. Test4actual help you pass any IT exam C. header compression D. increasing link capacity Answer: D 164. Drop 165. Drop | English | Chinese(Traditional) | Chinese(Simplified) | Japan 82 Test4auctual Information Co., Ltd. All rights reserved.
  83. 83. Test4actual help you pass any IT exam 166. Drop 167. Drop | English | Chinese(Traditional) | Chinese(Simplified) | Japan 83 Test4auctual Information Co., Ltd. All rights reserved.
  84. 84. Test4actual help you pass any IT exam 168. Drop 169. Drop 170. Drop | English | Chinese(Traditional) | Chinese(Simplified) | Japan 84 Test4auctual Information Co., Ltd. All rights reserved.
  85. 85. Test4actual help you pass any IT exam 171. Exhibit. 172. Exhibit. | English | Chinese(Traditional) | Chinese(Simplified) | Japan 85 Test4auctual Information Co., Ltd. All rights reserved.
  86. 86. Test4actual help you pass any IT exam | English | Chinese(Traditional) | Chinese(Simplified) | Japan 86 Test4auctual Information Co., Ltd. All rights reserved.
  87. 87. Test4actual help you pass any IT exam | English | Chinese(Traditional) | Chinese(Simplified) | Japan 87 Test4auctual Information Co., Ltd. All rights reserved.
  88. 88. Test4actual help you pass any IT exam 173. Hotspot | English | Chinese(Traditional) | Chinese(Simplified) | Japan 88 Test4auctual Information Co., Ltd. All rights reserved.
  89. 89. Test4actual help you pass any IT exam | English | Chinese(Traditional) | Chinese(Simplified) | Japan 89 Test4auctual Information Co., Ltd. All rights reserved.
  90. 90. Test4actual help you pass any IT exam | English | Chinese(Traditional) | Chinese(Simplified) | Japan 90 Test4auctual Information Co., Ltd. All rights reserved.
  91. 91. Test4actual help you pass any IT exam 174. Drop | English | Chinese(Traditional) | Chinese(Simplified) | Japan 91 Test4auctual Information Co., Ltd. All rights reserved.

×