5. Which Two Settings must be configured in order to use the
GUI to configure Call Admission Control with voice Applications
Answer / moparthynani
Answers: 1. QOS must be set to Platinum
2. WMM must be enabled
| Is This Answer Correct ? | 3 Yes | 0 No |
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
6. Which of these statements best describes VPLS ?
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)