show command
debug command
configuration command
rommon command
Which two statements or sets of statements are true about the application of the qos pre-classify command?()A、 If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.B、 The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.C、 With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.D、 With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.E、 With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
点击查看答案
Which type of software would the Cisco Catalyst 2950 Series switches use to deliver intelligent services to networks that require additional security, advanced QoS, and high availability?()A、 Enhanced ImageB、 StandardImagC、 Cisco IOS softwareD、 Enhanced Multilayer Software Image
For defining the QoS policies for each traffic class, which parameters should be identified? ()A、minimum bandwidth guaranteeB、average bandwidth guaranteeC、optimum bandwidth guaranteeD、maximum bandwidth rateE、IP precedence F priority
Cisco Catalyst 4500 Series switches are attractive to medium-size campuses with growth opportunities due to the switches enhanced security and which two other features? ()A、 enhanced multilayer software imageB、 connectivity to multiple types of WAN connectionsC、 Cisco Unified Communications ManagerD、 QoS for converged networksE、 modular, customizable components
Which two statements apply to policy scheduling?() (Choose two.)A、An individual policy can have only one scheduler applied.B、You must manually configure system-time updates.C、Multiple policies can use the same scheduler.D、Policies that do not have schedulers are not active.
You need to determine where the trust boundaries will be in a new Company VOIP design. Which two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic. D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network. E、Trust boundaries define the firewall rules for QoS admission into a network.
Which two statements about the QoS functionality of the Cisco SDM are true?()A、the first step when using the SDM QoS wizard is to select the inbound interface on which the QoS policy must be appliedB、the SDM QoS wizard can be used to optimize LAN, WAN, and VPN interfacesC、he SDM QoS wizard supports network-based application recognition (NBAR) to provide deep and stateful packet inspectionD、he SDM QoS wizard will apply custom queuing and priority queuing policies to the identified interfacesE、he SDM QoS wizard will apply low latency-queuing,custom-queuing and priority-queuing policies to the identified interfacesF、to create and manage the QoS settings, the user must select the QoS wizard task under the Monitor option