Which four of the following bit values are used for bits 5-7 of the DSCP field to select AF PHB?
Which four of the following bit values are used for bits 5-7 of the DSCP field to select AF PHB? (Choose four.) (Exhibit)
which two configuration modes?
The qos pre-classify command can be configured under which two configuration modes? (Choose two.) (Exhibit)
Which two of the following statements are true?
Refer to the partial router configuration. Which two of the following statements are true? (Choose two.) (Exhibit)
Why would applying the limit-interactive policy-map to the fa0/0 interface as shown below cause an error?
Refer to the exhibit. Why would applying the limit-interactive policy-map to the fa0/0 interface as shown below cause an error?
interface fa0/0
service-policy input limit-interactive
Which two values influence how the fragment size should be set when configuring FRF.12?
Which two values influence how the fragment size should be set when configuring FRF.12? (Choose two.) (Exhibit)
Which element is mandatory for QoS policy propagation through BGP operations?
Which element is mandatory for QoS policy propagation through BGP operations? (Exhibit)
Where is the fragment size configured when using FRF.12 link fragmentation and interleaving?
Where is the fragment size configured when using FRF.12 link fragmentation and interleaving? (Exhibit)
What is the most appropriate description for the proposed scheme?
Refer to the exhibit. A service provider is considering several alternative provisioning schemes for a new network. One proposed scheme involves aggregating 10-Mbps links from customers into a network with multiple 100-Mbps links to ensure that the network links have at least two times the capacity of the aggregate of the customer links.
What is the most appropriate description for the proposed scheme?
which demarcation line (shown as dotted lines) would the trust boundary normally exist?
Refer to the exhibit. A typical configuration involving an IP phone with an attached PC is shown. According to QoS recommendations, at which demarcation line (shown as dotted lines) would the trust boundary normally exist?
Which QoS action would have to be applied on POP B in AS30 to ensure that the traffic from the NAP (AS40) to t
Refer to the exhibit. QPPB is being used by the service provider (AS30). The table-map and route-map called "important" are implemented on router POP A. The command bgp-policy destination ip-prec-map is applied to the interface between POP A in AS30 and NAP (AS40).
Which QoS action would have to be applied on POP B in AS30 to ensure that the traffic from the NAP (AS40) to the customer (AS20) will be marked with an IP precedence of flash?