You are on page 1of 8

1.

What is the primary goal of QoS?


classification of traffic
filtering and queuing voice traffic
reducing bandwidth requirements

providing priority service to selected
traffic

2.

When implementing QoS in traffic queues, what is the first step the designer should take to ensure that traffic is
properly prioritized?
define QoS policies

define traffic classes
determine traffic patterns
identify traffic requirements
identify networking equipment

3.

Refer to the exhibit. Which option correctly matches the terms on top with its definition on the
bottom?
A=1, B=3, C=2, D=4
A=2, B=1, C=4, D=3
A=2, B=4, C=1, D=3
A=3, B=2, C=4, D=1

A=4, B=3, C=1, D=2
A=4, B=2, C=3, D=1

4.
Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no other traffic,
which queue will voice traffic from other networks use?
high
normal
medium

default

5.

A company that has a traditional telephone system wants to convert to IP telephony. Which two factors should be
considered for the design? (Choose two.)
Digital communications systems have greater noise than analog systems when processing voice traffic.

Voice-enabled routers or a server must be used for call control and signaling.
Voice to IP conversions can cause router overhead.

Power to the phones can be supplied through properly equipped patch panels or switches.

The cost to combine voice and data VLANs can be a considerable amount.

6.

When implementing VoIP services, which two design considerations should be followed? (Choose
two.)

Confirm that network jitter is minimal.
Use TCP to reduce delays and dropped packets.
Establish priority queuing to ensure that large data packets are sent uninterrupted.
Disable real-time protocols to reduce queuing strategy demands.

Ensure that packet delays do not exceed 150 ms.

7.

Several web and email servers have recently been installed as part of an enterprise network. The security
administrator has been asked to provide a summary of security features that can be implemented to help prevent
unauthorized traffic from being sent into or out of sensitive internal networks. Which three features should the
security administrator recommend? (Choose three.)

firewalls
priority queuing

access control lists

intrusion detection systems
DHCP
128-bit WEP

8.

Which two traffic types are examples of external traffic flows? (Choose two.)
A user in the IT department telnets to the core layer router.

A user in marketing connects to the web server of a competitor.
A user in the IT department telnets into the access layer switch.

A user in the services department logs in to a web-based email program.
A user in accounting connects to an FTP server that is connected to the access layer
switch.

9.
Refer to the exhibit. The network design documents include requirements to prevent switching
loops, to provide link-specific failover, and to provide Layer 3 recovery. Which two protocols
would be needed to provide the support? (Choose two.)
HDLC

HSRP
PPP

RSTP
VTP

10.

What design strategy should be followed when designing a network that uses video on demand?
implement the appropriate routing protocol to ensure that data segments arrive in order
implement different QoS queues based on the type of video traffic being distributed

install servers to store the data in a centrally located server farm
configure queuing in the core routers to ensure high availability

11.

What two Cisco tools can be used to analyze network application traffic? (Choose two.)

NBAR

NetFlow
AutoQoS
Wireshark
Custom Queuing

12.

A company is considering adding voice and video to the data networks. Which two statements are true if voice
and video are added? (Choose two.)
PoE switches must be purchased.

More UDP-based traffic flows will be evident.
Response times will be increased even if QoS is implemented.

QoS will most likely be implemented to prioritize traffic flows.
VPNs will most likely be implemented to protect the voice traffic.

13.
The design of an IP telephony system needs to meet the technical requirements to provide a connection to the
PSTN as well as provide high-quality voice transmissions using the campus network. Which two elements
directly affect the ability of the design to meet these requirements? (Choose two.)
voice-enabled firewall
PoE switches and patch panels
redundant backbone connectivity

voice-enabled router at the enterprise edge

separate voice and data VLANs with QoS implemented

15.

A network design must minimize latency to support real-time streaming applications. Which two protocols
enable control and scalability of the network resources and minimize latency by incorporating QoS
mechanisms? (Choose two.)

RTCP
HSRP
RSTP

RTP
RPC

16.

A database server is configured to purge all data that is 60 days old. Ten data items that are 60 days old are to be
purged. However, there is a failure halfway through the transaction, and the entire transaction is voided. What
type of transaction action occurred?

atomic
consistent
durable
isolated

17.

Which two items can be determined by diagramming internal traffic flow? (Choose
two.)
the type of ISP services needed
the capabilities of end-user devices

the areas where network congestion may occur
the location of VPN servers used to connect teleworkers

locations where high-bandwidth connections are required

18.
Which technology provides a mechanism for implementing QoS at Layer
2?
ToS

CoS
DSCP
IP precedence

19.

In network design, which technology can be implemented to prioritize traffic based on its
importance and technical requirements?

STP

QoS
RTP
TCP
VPN

20.

Which two statements are characteristics of file transfer traffic flows? (Choose
two.)
RTP should be used.
Packets are small in size.

Transfers are throughput intensive.

Response-time requirements are low.
Traffic cannot withstand retransmission delays.

21.

Which two major differences are associated with IP telephony when compared to traditional telephony that uses
a PBX? (Choose two.)

manages phones centrally
utilizes centralized call routing

creates peer-to-peer relationships between phones
requires a separate infrastructure to support data transfer
requires significant manual configuration when adding, moving, or changing phones

22.

An analysis of network protocols reveals that RTP and RTCP are being used. What uses these
protocols?
IDS
VPN
WLAN
firewall

real-time video

23.

When QoS is implemented in a converged network, which two factors can be controlled to improve
performance? (Choose two.)
link speed

delay
packet routing

jitter
packet addressing

24.

Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing
interface s0/1. What two pieces of information can an administrator learn from the output of this command?
(Choose two.)
queue traffic definitions
priority list protocol assignments

type of queuing being implemented

number of packets placed in each queue
queuing defaults that have been changed
bandwidth utilization counters for each queue
25.

Which two network applications are most affected by network congestion and delays? (Choose two.)

IP telephony

live video webcasts
audio file downloads
online banking services
file archival and retrieval

You might also like