A.use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B.use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C.use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D.configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E.configure video streaming. Configure audio streaming. Attach the codec to an interface
您可能感興趣的試卷
你可能感興趣的試題
A.automated alternate routing (AAR)
B.Cisco CallManager Attendant Console
C.real-time protocol (RTP)
D.Survivable Remote Site Telephony (SRST)
A.to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B.when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C.WLSE requires the 2700 location appliance to offer location tracking
D.WLSE can locate rogue APs and automatically shut them down
E.WLSE configuration is done using the command line interface (CLI) or a WEB based template
A.policy routing
B.increase link capacity
C.WRED
D.CBWFQ
E.LFI
F.WFQ
A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
最新試題
What are three Cisco Unified CallManager features? ()
Which Control Plane Policing (CoPP) statement is true?()
What are the three models of quality of service (QoS) in a network?()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()
Which of the items stated is typically the most expensive method of improving QoS across WAN links?()
What is an advantage of the IntServ QoS model?()
End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
Within the WMM policy, how many default QoS radio access categories are there?()
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()