What is applied to tunnel interfaces to allow QoS policies to be applied to packets going through the tunnel?
What is applied to tunnel interfaces to allow QoS policies to be applied to packets going through the tunnel?
What action should be taken so that NBAR can use the data in the PDLM file?
On it’s network, Acme Corporation is using NBAR to classify applications that use well known static TCP and UDP ports. The company has recently added several applications that are not currently recognized y their NBAR implementation. A PDLM file has been downloaded to the routers to be used by NBAR for protocol matching. What action should be taken so that NBAR can use the data in the PDLM file?
What is the purpose of the NBAR discovery protocol?
What is the purpose of the NBAR discovery protocol?
323 VoIP implementations?
Which IOS feature provides dial plan scalability and bandwidth management for H.323 VoIP implementations?
Which IOS gateway feature should be deployed at the remote site to enable local call control?
Acme Company has several offices around the country. The company has deployed a VoIP network with Cisco Unified CallManager in a multisite centralized configuration but there is a requirement to place a call agent at some of the remote sites. Which IOS gateway feature should be deployed at the remote site to enable local call control?
What will happen when a seventh call is attempted across the WAN link?
The Acme company has determined that during it’s busiest hours, the average number of internal VoIP calls across the WAN link is four (4). Since this is an average, the WAN link has been sized for six (6) calls with no call admission control. What will happen when a seventh call is attempted across the WAN link?
Which statement is true about the distributed call control in a VoIP network?
Which statement is true about the distributed call control in a VoIP network?
Which two statements best describe enhanced wireless security encryption? (Choose two)
Which two statements best describe enhanced wireless security encryption? (Choose two)
Which two statements about the open and shared key wireless-authentication methods are true? (Choose two)
Which two statements about the open and shared key wireless-authentication methods are true? (Choose two)
What are three facts of control plane policing? (Choose three)
What are three facts of control plane policing? (Choose three)