A.ip sla 1 icmp-echo 1.1.1.1 tos 160
B.ip sla 1 icmp-echo 1.1.1.1 tos 20
C.ip sla 1 icmp-echo 1.1.1.1 precedence 5
D.ip sla 1 icmp-echo 1.1.1.1 dscp 20
您可能感興趣的試卷
你可能感興趣的試題
A.The phones are not sending traffic with the correct DSCP value.
B.The Cisco CallManager is not marking the traffic correctly.
C.This is most likely a bug on the CE routers.
D.Your LAN QoS is incorrectly configured.
A.routing issue
B.denial-of-service attack
C.MAC flooding
D.spanning-tree recalculation
E.Layer 2 loop
F.ARP spoofing attack
A. The switches are not the same model
B. You are not using the correct SFP
C. You are not using correct optical media converters
D. Configuration should be modified, because the distance is longer
A. Tunnel IPv6 over IPv4 to connect far-end IPv6 networks
B. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is not possible
C. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is possible
D. What is the meaning of EUI-64 and how does it work?
E. Tunnel IPv4 over IPv6 to connect far-end IPv4 networks.
A.NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.
B.NTP authentication verifies the source,not the recipient.
C.NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D.Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E.A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
最新試題
How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()
Based on the output provided in the exhibit, to which address or location will the router forward a packet sent to 192.168.32.1?()
Which three message types are valid PIMv2 message types?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which three protocols or applications should be placed in a class that is configured with WRED?()
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()
Which two are differences between IGMPv2 and IGMPv3 reports?()