Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()
A.Effectively the trust boundary has been moved to the IP phone
B.The host is now establishing the CoS value and has effectively become the trust boundary
C.The switch is rewriting packets it receives from the IP phone and determining the CoS value
D.The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the CoS
E.RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Which statement is true about a voice VLAN?()
A.Physically the voice network and the data network are separate
B.The voice traffic will normally be on a different IP subnet than will the data traffic
C.End user intervention is necessary to place the phone into the proper VLAN
D.The same security policy should be implemented for both voice and data traffic
E.The data VLAN must be configured as the native VLAN
A.::/0 is the unspecified address, and ::/128 is the multicast address
B.::/0 is the unicast address, and ::/128 is the anycast address
C.::/0 is the unicast address, and ::/128 is the multicast address
D.::/0 is the anycast address, and ::/128 is the multicast address
E.::/0 is the default route, and ::/128 is the unspecified address
F.::/0 is the anycast address, and ::/128 is the default address
A.The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two
B.The leading zeroes in any 16-bit segment do not have to be written.
C.Every 16-bit segment that consists of all zeroes can be represented with a single colon
D.The trailing zeroes in any 16-bit segment do not have to be written.
E.Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon
F.Two zeroes in the middle of any 16-bit segment do not have to be written
Refer to the exhibit. Which two statements are correct?()
A.All six routes will be installed in the routing table
B.Two routes will be installed in the routing table
C.Four routes will be installed in the routing table
D.All the routes were redistributed into BGP from an IGP
E.All the routes were originated by BGP with the network command
A.The network was originated via redistribution of an interior gateway protocol into BGP
B.The network was defined by a static route
C.The network was originated via a network or aggregate command
D.The network was learned via EBGP
E.The network was learned via IBGP
最新試題
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()
If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?()
Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()
Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()
Which two statements are true about network voice traffic? (Choose two.)()
Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Refer to the exhibit. Which statement is true about where trust boundaries should be established in a network?()
Which two statements are true about voice packets in a LAN? (Choose two.) ()
Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()