You are on page 1of 61

wwwwww..EExxaammKKiinnggss..

ccoomm

Exam : Cisco 642-845

Title : ONT - Optimizing Converged


CiscoNetworks

Version : V 6.02

ExamKings,help you pass any IT exam!


| English | Chinese(Traditional) | Chinese(Simplified) | - 1 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

1. Which two QoS statements are true about the use of the SDM QoS wizard? (Choose two.)

A. Business-critical traffic includes VoIP and voice signaling packets.

B. SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec

tunnels.

C. SDM can provide QoS for real-time traffic and business-critical traffic.

D. SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy.

E. SDM creates a low latency queuing (LLQ) service policy with its associated classes.

F. When allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per

second (kBps).

Answer: CE

2. Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true? (Choose two.)

A. To support fault and policy reporting, the WLSE requires a Wireless Control System (WCS).

B. When WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby

APs.

C. WLSE requires the 2700 location appliance to offer location tracking.

D. WLSE can locate rogue APs and automatically shut them down.

E. WLSE configuration is done using the command line interface (CLI) or a WEB based template.

Answer: BD

3. Which two statements are true about the function of CAC? (Choose two.)

A. CAC provides guaranteed voice quality on a link.

B. CAC artificially limits the number of concurrent voice calls.

C. CAC is used to control the amount of bandwidth that is taken by a call on a link.

D. CAC prevents oversubscription of WAN resources that is caused by too much voice traffic.

E. CAC allows an unlimited number of voice calls while severely restricting, if necessary, other forms of

traffic.

F. CAC solves voice congestion problems by using QoS to give priority to UDP traffic.

Answer: BD

| English | Chinese(Traditional) | Chinese(Simplified) | - 2 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

4. Which two statements are true about the implementation of QoS? (Choose two.)

A. Implementing DiffServ involves the configuration of RSVP.

B. Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.

C. Implementing IntServ involves the utilization of RSVP.

D. Traffic should be classified and marked by the core network devices.

E. Traffic should be classified and marked as close to the edge of the network as possible.

Answer: CE

5. Which codec standard would provide the highest voice-quality, mean opinion score (MOS)?

A. G.711, PCM

B. G.728, LDCELP

C. G.729, CS-ACELP

D. G.729A, CS-ACELP

Answer: A

6. Voice activity detection (VAD) suppresses the transmission of silence patterns. On average, and

assuming that a link carries at least 24 calls, what percentage of total bandwidth could VAD save?

A. 5

B. 15

C. 25

D. 35

E. 45

F. 55

Answer: D

7. Two sites are using a multisite centralized call processing model. The voice gateway on the remote

branch has lost IP connectivity to its Cisco CallManager server. Which feature enables the remote

gateway to take the role of the call agent during the WAN failure?

A. automated alternate routing (AAR)

B. Cisco CallManager Attendant Console

| English | Chinese(Traditional) | Chinese(Simplified) | - 3 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

C. real-time protocol (RTP)

D. Survivable Remote Site Telephony (SRST)

Answer: D

8. Refer to the exhibit. Both routers have been configured as VoIP gateways. They must also support

traditional telephony devices to connect to analog telephones. Which two configuration changes would

correctly support the voice requirements? (Choose two.)

A. On each router, under the dial-peer voice 1 pots configuration, add the port fa0/0 command.

B. On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/0 command.

C. On each router, configure dial-peer voice 1 as a voip connection and configure dial-peer voice 2 as a

pots connection.

D. Under the dial-peer voice 1 pots configuration, change the destination pattern of 1111 to 2222 on the

R1 router, and 2222 to 1111 on the R2 router.

E. Under the dial-peer voice 2 voip configuration, change the destination pattern of 1111 to 2222 on the

R1 router, and 2222 to 1111 on the R2 router.

F. Under the dial-peer voice 2 voip configuration, change the destination target address of 10.2.2.2 to

10.1.1.1 on the R1 router, and the destination target address of 10.1.1.1 to 10.2.2.2 on the R2 router.

Answer: BE

| English | Chinese(Traditional) | Chinese(Simplified) | - 4 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

9. To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing

and compression mechanisms need to be used? (Choose two.)

A. class-based weighted fair queuing (CBWFQ)

B. low latency queuing (LLQ)

C. priority queuing (PQ) or custom queuing (CQ)

D. Real-Time Transport Protocol (RTP) header compression

E. TCP header compression

F. UDP header compression

Answer: BD

10. Which three statements about end-to-end delay are true? (Choose three.)

A. End-to-end delay is the sum of propagation delays, processing delays, serialization delays, and

queuing delays.

B. Coast-to-coast end-to-end delay over an optical link is about 20 ms.

C. Processing delay depends on various factors, which include CPU speed, CPU utilization, IP switching

mode, and router architecture.

D. Propagation and serialization delays are related to the media.

E. Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).

F. Serialization delay is the time it takes for a router to take the packet from an input interface and put it

into the output queue of the output interface.

Answer: ACD

11. What three statements are true about the various deployments of the 802.1x Extensible Authentication

Protocol (EAP)? (Choose three.)

A. EAP-FAST has the ability to tie login with non-Microsoft user databases.

B. EAP-TLS supports static passwords.

C. PEAP supports one-time passwords.

D. LEAP does not support multiple operating systems.

E. LEAP supports Layer 3 roaming.

F. PEAP does not work with WPA.

| English | Chinese(Traditional) | Chinese(Simplified) | - 5 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer: ACE

12. What are three security problems with Wi-Fi Protected Access (WPA)? (Choose three.)

A. WPA is based on the outdated IEEE 802.11i standard.

B. WPA uses RSN, which uses the same base encryption algorithm as RC4.

C. WPA requires a hardware upgrade that may not be supported by all vendors.

D. WPA uses TKIP, which uses the same base encryption algorithm as WEP.

E. WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,

forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

F. WPA is susceptible to a security weakness when preshared keys are used.

Answer: DEF

13. Which three methods would help prevent critical network-traffic packet loss on high speed serial

interfaces? (Choose three.)

A. policy routing

B. increase link capacity

C. WRED

D. CBWFQ

E. LFI

F. WFQ

Answer: BCD

14. Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky

speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP

transfer rate and the voice problems? (Choose two.)

A. CBWFQ

B. LLQ

C. traffic shaping

D. WRED

Answer: BD

| English | Chinese(Traditional) | Chinese(Simplified) | - 6 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

15. Which two statements about the DiffServ QoS model are true? (Choose two.)

A. DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.

B. Network traffic is identified by class, and the level of service is chosen for each class.

C. The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of

equipment.

D. RSVP enables the DiffServ model to provide end-to-end QoS.

E. The DiffServ model is more scalable than the IntServ model.

F. The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the

public Internet.

Answer: BE

16. Which two statements are true about the various methods of implementing QoS? (Choose two.)

A. Cisco AutoQoS can be used repeatedly to apply a single QoS policy to multiple interfaces.

B. Cisco AutoQoS includes an optional web-based GUI for automating the configuration of QoS services.

C. Cisco AutoQoS provides capabilities to automate VoIP deployments.

D. The auto qos global configuration command is used to configure Cisco AutoQoS.

E. The Modular QoS CLI (MQC) is the best way to fine tune QoS configurations.

F. The SDM QoS wizard is the fastest way to implement QoS.

Answer: CE

17. Which two statements are true about analog to digital conversion of voice signals for use in digital

telephony networks? (Choose two.)

A. The three required steps in the analog to digital conversion are sampling, encoding, and compression.

B. The three required steps in the analog to digital conversion are sampling, quantization, and

compression.

C. The three required steps in the analog to digital conversion are sampling, quantization, and encoding.

D. The output of the sampling process is a pulse code modulation (PCM) signal.

E. The output of the sampling process is a pulse amplitude modulation (PAM) signal.

Answer: CE

| English | Chinese(Traditional) | Chinese(Simplified) | - 7 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

18. Which two statements are true about the digital audio in a VoIP network? (Choose two.)

A. Standard encoding techniques create an uncompressed digital data rate of 4000 bps.

B. Standard encoding techniques create an uncompressed digital data rate of 8000 bps.

C. Standard encoding techniques create an uncompressed digital data rate of 64,000 bps.

D. Voice quality is not a concern if compression is not used.

E. Two methods of quantization are linear and logarithmic.

F. Two methods of compression are u-law and a-law .

Answer: CE

19. Which statement is true about Foreign Exchange Station (FXS) ports on a router?

A. The FXS interface allows an analog connection to be directed at the public switched telephone network

(PSTN's) central office.

B. The FXS interface connects directly to a standard telephone, fax machine, or similar device and

supplies ring, voltage, and dial tone.

C. The FXS interface connects directly to an IP phone and supplies ring, voltage, and dial tone.

D. The FXS interface connects directly to ISDN voice channels.

Answer: B

20. Which two statements are true about voice ports on a router? (Choose two.)

A. Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports.

B. Calls to the PSTN can be made via FXS or T1/E1 trunk ports.

C. Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports.

D. Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely

processed by voice-enabled routers.

Answer: AD

21. What are two major sources of delay that can be managed by QoS in voice-enabled networks?

(Choose two.)

A. propagation delay

| English | Chinese(Traditional) | Chinese(Simplified) | - 8 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

B. voice packet serialization delay

C. congested egress queues

D. header overhead

E. packets dropped because of CRC errors

Answer: CD

22. Which statement is true about a distributed call control environment and the processing of dialed digits

from an IP phone?

A. The router that is directly connected to the IP phone will look up the called number in its call routing

table.

B. The router that is directly connected to the IP phone will inform its call agent when a service request is

detected.

C. When the IP phone is picked up, the IP phone initiates the service request.

D. The directly connected router passes the collected digits to its call agent, and the call agent looks up in

its call-routing table the called number.

Answer: A

23. What are two steps that are taken when a router converts a voice signal from analog to digital form?

(Choose two.)

A. sampling

B. packetization

C. quantization

D. serialization

Answer: AC

24. Which three pieces of information are used to calculate the total bandwidth of a VoIP call? (Choose

three.)

A. the packetization size

B. the serialization of the interface

C. the quantization

| English | Chinese(Traditional) | Chinese(Simplified) | - 9 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

D. the packet rate

E. the UDP overhead

F. the TCP overhead

Answer: ADE

25. Which two statements about the DiffServ model are true? (Choose two.)

A. A class can be identified as a single application, multiple applications with similar service needs, or be

based on the source or destination IP addresses.

B. A drawback of the DiffServ model is that it does not provide backward compatibility with devices that

can only use the ToS field.

C. DiffServ uses the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs).

D. The DiffServ field occupies the same eight bits of the MAC header that were previously used for the

ToS field.

E. The first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol

(RSVP) value.

F. The primary goal of DiffServ is scalability.

Answer: AF

26. In which three network technologies is traffic shaping used to prevent and manage congestion?

(Choose three.)

A. Asynchronous Transfer Mode (ATM)

B. data-link switching (DLSw)

C. Route Processor Redundancy (RPR)

D. Frame Relay (FR)

E. Metro Ethernet

F. Multiprotocol Label Switching (MPLS)

Answer: ADE

27. Which two statements about the QoS functionality of the Cisco SDM are true? (Choose two.)

A. The first step when using the SDM QoS wizard is to select the inbound interface on which the QoS

| English | Chinese(Traditional) | Chinese(Simplified) | - 10 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

policy must be applied.

B. The SDM QoS wizard can be used to optimize LAN, WAN, and VPN interfaces.

C. The SDM QoS wizard supports network-based application recognition (NBAR) to provide deep and

stateful packet inspection.

D. The SDM QoS wizard will apply custom queuing and priority queuing policies to the identified

interfaces.

E. The SDM QoS wizard will apply low latency-queuing, custom-queuing and priority-queuing policies to

the identified interfaces.

F. To create and manage the QoS settings, the user must select the QoS wizard task under the Monitor

option.

Answer: BC

28. Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?

(Choose two.)

A. The SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling

packets.

B. The SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and

video packets.

C. The SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video,

and video streaming packets.

D. The SDM QoS wizard will create two business-critical traffic classes to handle transactional and

network management packets.

E. The SDM QoS wizard will create three business-critical traffic classes to handle transactional, network

management, and routing packets.

F. The SDM QoS wizard will create four business-critical traffic classes to handle transactional, network

management, routing, and best-effort packets.

Answer: AE

29. Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true?

(Choose two.)

| English | Chinese(Traditional) | Chinese(Simplified) | - 11 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. The two methods of authentication using the WEP encryption are open and shared key.

B. The 802.11 standard defines WEP security using 128-bit keys.

C. WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST.

D. WEP is a scalable encryption solution that uses static keys for authentication.

E. WEP security provides only one-way authentication.

F. WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES

(symmetric block cipher) mechanism.

Answer: AE

30. Which two statements about the Wireless Location Appliance are true? (Choose two.)

A. A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and

passes on data from its associated Cisco WLAN controllers.

B. Before using the Web interface, the initial configuration of the Wireless Location appliance must be

done using the command-line interface (CLI).

C. The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.

D. The Wireless Location Appliance visually displays the location information of WLAN devices and

forwards this information to third-party applications using the Simple Network Management Protocol

(SNMP).

E. The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this

information for 90 days.

Answer: AB

31. What best describes an FXO interface?

A. analog trunks that provide the Survivable Remote Site Telephony (SRST) feature

B. analog trunks that provide VoIP gateway functionality

C. analog trunks that connect a gateway to plain old telephone service (POTS) device such as analog

phones, fax machines, and legacy voice-mail systems

D. analog trunks that connect a gateway to a central office (CO) or private branch exchange (PBX)

Answer: D

| English | Chinese(Traditional) | Chinese(Simplified) | - 12 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

32. Which statement is correct about the Cisco QoS SDM wizard?

A. The best-effort class will need to have its percentage entered in the QoS Policy Generation screen.

B. SDM QoS wizard provides real-time validation of application usage of WAN bandwidth.

C. The SDM wizard is not able to monitor QoS policing traffic.

D. The SDM QoS Wizard is pre-installed on enterprise routers.

Answer: B

33. Which two statements about the WLAN Solution Engine (WLSE) are true? (Choose two.)

A. WLSE supports centralized configuration.

B. WLSE supports distributed configuration.

C. WLSE can pick up statistics on a device even if the device is not properly configured.

D. WLSE can be used to upgrade the firmware on APs and bridges.

E. WLSE monitors device fault and performance conditions but cannot report any policy

misconfigurations.

Answer: AD

34. What is the goal of QoS in a network?

A. prevent packets from being dropped

B. increase available bandwidth

C. reduce hardware errors

D. provide predictable network service

E. eliminate propagation delay

F. eliminate jitter and packet loss

Answer: D

35. Which two IntServ functions are required on a router? (Choose two.)

A. admission control

B. DSCP classification

C. monitoring

D. marking

| English | Chinese(Traditional) | Chinese(Simplified) | - 13 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

E. scheduling

Answer: AE

36. Which two statements about queuing mechanisms are true? (Choose two.)

A. FIFO queuing is only appropriate for slower serial interfaces.

B. Weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfaces.

C. Only one queuing mechanism type can be applied to an interface.

D. Weighted fair queuing does not require the configuration of access lists to classify traffic.

E. Flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion.

Answer: CD

37. Which three statements are true about the application of QoS models? (Choose three.)

A. The DiffServ model requires applications to signal the network with QoS requirements.

B. The DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination

addresses.

C. The DiffServ model requires RSVP.

D. The best effort model is suitable for applications such as file transfer and e-mail

E. The IntServ model requires applications to signal the network with QoS requirements.

F. The IntServ model attempts to deliver a level of service based on the QoS specified by each packet

Answer: BDE

38. What are three considerations when choosing the QoS model to deploy in a network? (Choose three.)

A. the routing protocols being utilized in the network

B. the applications utilizing the network

C. the traffic destinations

D. network addressing scheme

E. cost of implementation

F. the amount of the control needed of the resources

Answer: BEF

| English | Chinese(Traditional) | Chinese(Simplified) | - 14 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

39. What are two steps needed to define a QoS policy for a traffic class? (Choose two.)

A. Determine a minimum bandwidth guarantee.

B. Determine interfaces to which to apply policy.

C. Assign priorities to the class.

D. Configure access control lists.

Answer: AC

40. Which three statements are true about the data traffic characteristics of voice traffic? (Choose three.)

A. Latency must be kept below 150 ms.

B. Latency is not a concern as long as jitter is kept below 30 ms.

C. Voice packets do not require a specific type of queuing.

D. Voice packets are rather small

E. Voice packets require TCP for rapid retransmission of dropped packets.

F. Voice packets require a fairly constant bandwidth reserved for voice control traffic as well as for the

voice payload.

Answer: ADF

41. Which statement is true about the comparison of voice traffic with video traffic?

A. Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact

on other traffic flows.

B. Latency requirements are less stringent for video traffic than for voice traffic.

C. Video traffic is less sensitive to dropped packets than for voice traffic.

D. Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.

E. Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other

traffic flows.

F. Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

Answer: A

42. When analog signals are digitized using the G.711 codec, voice samples are encapsulated into

protocol data units (PDUs) involving which three headers? (Choose three.)

| English | Chinese(Traditional) | Chinese(Simplified) | - 15 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. IP

B. TCP

C. RTP

D. UDP

E. H.323

F. cRTP

Answer: ACD

43. Which header or set of headers does cRTP compress?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 2 and Layer 3

E. Layer 3 and Layer 4

Answer: E

44. When a router converts analog signals to digital signals, what three steps are always included in the

process? (Choose three.)

A. involution

B. encoding

C. sampling

D. quantization

E. compression

F. companding

Answer: BCD

45. Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access

version 2 (WPA2) security solutions? (Choose two.)

A. Both WPA and WPA2 require authentication support via IEEE 802.1X and Pre-Shared Key (PSK).

B. Both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE

| English | Chinese(Traditional) | Chinese(Simplified) | - 16 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

802.11i security implementation.

C. WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client

devices.

D. WPA provides only a standard for authentication. WPA2 provides a standard for authentication and

encryption.

E. WPA requires encryption support via Temporal Key Integrity Protocol (TKIP). WPA2 provides

encryption support via (symmetric block cipher) AES-CCMP.

Answer: AE

46. Which certification-based protocol is implemented for wireless QoS between an AP and a wireless

client over RF media?

A. WMM using DCF

B. WMM using EDCF

C. 802.1e using DCF

D. 802.1e using EDCF

Answer: B

47. A branch office of Acme Insurance has 15 IP phones connected to the main office using the distributed

call processing model. Normally, the phones work with great quality. However, during very busy times

when all of the agents are on the phone at the same time, the voice quality drops precipitously. Words or

phrases or both are dropped from conversations. What is the most likely cause of the problem?

A. Large files are being downloaded over the WAN network.

B. IP phone traffic is not being classified correctly.

C. More bandwidth is required for the office LAN.

D. Call Admission Control has not been implemented.

E. Employees are watching videos over the Internet.

F. Header compression is not being used.

Answer: D

48. What are three features of voice traffic on a network? (Choose three.)

| English | Chinese(Traditional) | Chinese(Simplified) | - 17 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. bursty

B. constant

C. bandwidth intensive

D. small packet sizes

E. time-sensitive

F. retransmittable

Answer: BDE

49. A stream of voice packets transmitted over a WAN network encounters differing queuing delays. One

router in the path used by the voice packets delays some of the packets for 4 ms while transmitting a large

video file, but delays other packets only 2 ms. Another router delays some packets 5 ms, but transmits

others in 2 ms. How would you best describe this type of problem?

A. end-to-end delay

B. interference from bulk data traffic

C. processing delays

D. serialization delays

E. jitter

Answer: E

50. What are two features of WLSE-Express wireless management? (Choose two.)

A. centralized management for autonomous access points

B. centralized management for lightweight access points

C. centralized management that requires an external AAA server

D. centralized management with integrated AAA server

E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days

F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days

Answer: AD

51. What are two features of WCS wireless management? (Choose two.)

A. centralized management for autonomous access points

| English | Chinese(Traditional) | Chinese(Simplified) | - 18 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

B. centralized management for lightweight access points

C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days

D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days

E. the inclusion of an integrated AAA server

F. an external AAA-server requirement

Answer: BC

52. After logging into the WCS wireless management server, the administrator is presented with the initial

home page showing the network summary. There are four main menu choices across the top horizontal

screen. What is the purpose of the Location menu choice?

A. to configure the location and addition of a Wireless LAN Controller (WLC) using an IP address

B. to enable the "on demand" location of a single rogue AP or rogue client

C. to configure the communication with a Location Appliance

D. to configure the location and addition of a wireless access point using an IP address

Answer: C

53. What is the correct procedure for adding an access point in WCS?

A. Choose Configure > Access_Point, then enter the AP MAC address.

B. Choose Configure > Access_Point, then enter the IP address of the AP.

C. Choose Configure > Controller, then enter the IP address of the WLC.

D. Wait until the WLC downloads its code from the WCS and choose the access point from the list under

the WLC option of the Configure menu.

E. Wait until the AP downloads its code from the WCS and choose the access point from the list under the

Access_Point option of the Configure menu.

| English | Chinese(Traditional) | Chinese(Simplified) | - 19 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer: C

54. Which two statements about the open and shared key wireless-authentication methods are true?

(Choose two.)

A. Shared key authentication is considered more secure than open authentication.

B. Shared key authentication is considered less secure than open authentication.

C. If the WEP keys do not match using the open authentication method, the client will not authenticate,

associate, and transfer data.

D. If the WEP keys do not match using the open authentication method, the client will still be able to

authenticate and associate, but will not transfer data.

E. If the WEP keys do not match using the open authentication method, the client will still be able to

authenticate, associate, and transfer data.

Answer: BD

55. Which statement is true about the capabilities of a voice gateway router?

A. Voice gateways with analog interfaces need a gatekeeper to convert analog signals into digital format

before voice is encapsulated into IP packets.

B. Voice gateways need a gatekeeper to interconnect the VoIP networks with the PSTN network.

C. Voice gateways with Cisco Unified CallManager Express (CME) can permanently act as a call agent

for IP phones.

D. Voice gateways equipped with a DSP module can take the role of the call agent during WAN failure.

Answer: C

56. Which statement is true about the distributed call control in a VoIP network?

A. The VoIP endpoints have the intelligence to set up and control calls.

B. Call setup and control functionality is centralized in one call agent or cluster.

C. Call setup and control resides in call agents that are distributed throughout the network.

D. Each VoIP device has separate call control, voice packetization, and transport mechanisms.

Answer: A

| English | Chinese(Traditional) | Chinese(Simplified) | - 20 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

57. Using the G.729 codec and the default cRTP configuration, what is the approximate VoIP bandwidth

savings across a Frame Relay link that adds a 6 byte frame header?"

A. 55%

B. 58%

C. 60%

D. 63%

Answer: B

58. The Acme company has determined that during its busiest hours, the average number of internal VoIP

calls across the WAN link is four (4). Since this is an average, the WAN link has been sized for six (6) calls

with no call admission control. What will happen when a seventh call is attempted across the WAN link?

A. The seventh call is routed via the PSTN.

B. The call is denied and the original six (6) calls remain.

C. The call is completed and the first call is dropped.

D. The call is completed, but all calls have quality issues.

E. The call is completed but the seventh call has quality issues.

Answer: D

59. Acme Company has offices around the country. With the use of Cisco Unified CallManager, the

company has deployed a VoIP network in a multisite centralized configuration. Which IOS gateway

feature should be deployed to enable VoIP devices to register with a local gateway and continue to

function when the connection to the Cisco Unified CallManager is broken?

A. Gatekeeper multizone

B. Call Admission Control (CAC)

C. Automatic Alternate Routing (AAR)

D. Survivable Remote Site Telephony (SRST)

Answer: D

60. Acme Company has several offices around the country. The company has deployed a VoIP network

with Cisco Unified CallManager in a multisite centralized configuration but there is a requirement to place

| English | Chinese(Traditional) | Chinese(Simplified) | - 21 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

a call agent at some of the remote sites. Which IOS gateway feature should be deployed at the remote

site to enable local call control?

A. Gatekeeper multizone

B. Call Admission Control (CAC)

C. Automatic Alternate Routing (AAR)

D. Survivable Remote Site Telephony (SRST)

E. Cisco Unified CallManager Express (CME)

Answer: E

61. Which IOS feature provides dial plan scalability and bandwidth management for H.323 VoIP

implementations?

A. Gatekeeper

B. Call Routing

C. Call Admission Control

D. Digital Signal Processors

Answer: A

62. Refer to the exhibit. Which statement is true?

A. Telnet packets with a source address of 10.1.1.2 will be denied access to the control plane.

B. Telnet packets with a source address of 10.1.1.2 forwarded to the control plane will be policed at the

| English | Chinese(Traditional) | Chinese(Simplified) | - 22 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

specified rate.

C. Telnet packets with a source address of 10.1.1.2 will be forwarded to the control plane without

constraint.

D. Telnet packets with a destination address of 10.1.1.1 will be forwarded to the control plane without

constraint.

Answer: C

63. In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call

setup, call maintenance, and call teardown? (Choose three.)

A. H.323

B. UDP

C. RTP

D. TCP

E. Media Gateway Control Protocol (MGCP)

F. session initiation protocol (SIP)

Answer: AEF

64. Refer to the exhibit. What type of interface will connect the voice gateway router R1 to the analog

phone and the fax machine?

A. The analog phone will be connected to the FXS port, and the fax machine will be connected to the FXO

port on router R1.

B. The analog phone will be connected to the FXO port, and the fax machine will be connected to the FXS

port on router R1.

| English | Chinese(Traditional) | Chinese(Simplified) | - 23 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

C. Both devices will be connected to the FXS ports on router R1.

D. Both devices will be connected to the FXO ports on router R1.

E. Both devices will be connected to the E and M ports on router R1.

Answer: C

65. What type of services are provided by the Cisco IOS gateways in a VoIP network with Cisco

CallManger functionality?

A. Cisco IOS gateways provide services such as address translation and network access control for the

devices on the network.

B. Cisco IOS gateways provide services such as bandwidth management and accounting.

C. Cisco IOS gateways provide media termination and signal translation between the public switched

telephone network (PSTN) and IP networks.

D. Cisco IOS gateways provide zone management for all registered endpoints in the network.

Answer: C

66. What are two components of the QoS Integrated Services (IntServ) model? (Choose two.)

A. link efficiency

B. admission control

C. classification and marking

D. shaping and policing

E. congestion avoidance using the RTP protocol

F. resource reservation using the RSVP protocol

Answer: BF

67. Which QoS model manages the QoS requirements for the network on a per-hop behavior (PHB)

basis?

A. best-effort delivery

B. ingress committed rate (ICR)

C. shaping and policing

D. egress committed rate (ECR)

| English | Chinese(Traditional) | Chinese(Simplified) | - 24 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

E. Integrated Services (IntServ)

F. differentiated services (DiffServ)

Answer: F

68. Refer to the exhibit. What QoS model should be used to reserve the requested bandwidth and delay

needed for each allowed VoIP call regardless of changing network conditions?

A. best-effort delivery

B. ingress committed rate (ICR)

C. shaping and policing

D. egress committed rate (ECR)

E. Integrated Services (IntServ)

F. differentiated services (DiffServ)

Answer: E

69. Which two statements are true about the protocols that are used for transmitting voice traffic? (Choose

two.)

A. RTP multiplexing is used to keep multiple phone conversations separate.

B. RTP provides end-to-end delivery services for voice traffic.

C. UDP is used to ensure a reliable transmission from sender to receiver.

D. RTP is used to provide resource reservation for the voice stream.

E. UDP provides multiplexing of multiple phone conversations.

Answer: BE

| English | Chinese(Traditional) | Chinese(Simplified) | - 25 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

70. What best describes processing delay?

A. the time required from receipt of the incoming frame, until the frame/packet has been queued for

transmission

B. the time taken for a single packet to traverse the physical medium from one end to the other

C. the time taken to place a frame on the physical medium for transport

D. the time spent for a packet to reside in the output queue of a router

Answer: A

71. What are two reasons for packet loss on a VoIP connection? (Choose two.)

A. serialization delay

B. overrun

C. full buffers and queues

D. propagation delay

E. shaping delay

F. TCP header errors

Answer: BC

72. What is the best description of serialization delay?

A. the time it takes for a Layer 3 switch or a router to switch a packet from an inbound interface to the

queue of the outbound interface

B. the time it takes for a packet to propagate from source to destination

C. the time it takes to place a frame on the physical medium for transport

D. the time a packet resides in the outbound queue of a router

Answer: C

73. Refer to the exhibit. Which statement is true?

| English | Chinese(Traditional) | Chinese(Simplified) | - 26 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. Telnet traffic originating from hosts 10.1.1.1 and 10.1.1.2 will not be allowed to pass through the router.

B. Telnet traffic originating from hosts 10.1.1.1 and 10.1.1.2 will not be allowed to access the router.

C. Telnet traffic originating from hosts 10.1.1.1 and 10.1.1.2 will not be rate limited.

D. Telnet traffic originating from all hosts except 10.1.1.1 and 10.1.1.2 will not be rate limited.

Answer: C

74. What are three Cisco Unified CallManager features? (Choose three.)

A. programming interface to external applications

B. FXS and FXO port negotiation

C. AutoQos VoIP trust boundaries

D. signaling and device control

E. LLQ for voice and video traffic

F. directory and XML services

Answer: ADF

75. How does weighted random early detection (WRED) prevent packet loss?

A. increases link capacity

B. increases buffer space to accommodate bursts of traffic from delay-sensitive applications

C. provides prioritized forwarding for drop-sensitive applications

D. drops lower priority packets before congestion occurs

E. separates traffic into as many as 64 queues that can be uniquely prioritized

Answer: D

| English | Chinese(Traditional) | Chinese(Simplified) | - 27 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

76. What are three types of packet delays that occur in a network? (Choose three.)

A. timing

B. queuing

C. differential

D. serialization

E. packetization

F. propagation

Answer: BDF

77. What are two ways to minimize the delay of VoIP packets that are traversing a network? (Choose

two.)

A. Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.

B. Use WFQ, CBWFQ, and LLQ to compress the payload.

C. Give TCP packets priority over UDP packets.

D. Use control plane policing for cRTP queuing.

E. Use stacker and predictor to compress the payload.

Answer: AE

78. What are three factors used to determine the amount of bandwidth that is required for a single VoIP

call? (Choose three.)

A. codec

B. link speed

C. Layer 2 encapsulation

D. packet overhead (IP/UDP/RTP)

E. link delay

F. total number of simultaneous calls that are allowed

Answer: ACD

79. Refer to the exhibit. Which statement is true about the function of the frame-relay voice-bandwidth

24000 command that is shown in the partial configuration?

| English | Chinese(Traditional) | Chinese(Simplified) | - 28 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. It limits the total bandwidth available on the Frame Relay link.

B. It provides call admission control by limiting the number of voice calls over the Frame Relay link.

C. It sets up IP RTP Priority features that reserve bandwidth for voice traffic flows.

D. It is functionally equivalent to configuring LLQ.

E. It limits the bandwidth that is taken by individual voice calls to 24000 b/s.

Answer: B

80. What are two reasons to implement H.323 gatekeepers? (Choose two.)

A. to eliminate the need for VoIP gateways

B. to scale a VoIP installation with multiple gateways

C. to provide call admission control and limit the number of simultaneous calls on the network

D. to meet the requirement to control H.323 gateways on a LAN

E. to accept call requests and reduce the load on the gateway

Answer: BC

81. Refer to the exhibit. The network has been configured with H.323 gateways and gatekeepers as

shown. Which statement is true when a call is placed?

| English | Chinese(Traditional) | Chinese(Simplified) | - 29 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. A gatekeeper is contacted to determine the correct local gateway to use.

B. A gateway will receive the call and forward a call request to the local gatekeeper.

C. A gateway will receive the call and forward a call request to the gatekeeper on the other side of the

WAN.

D. A gatekeeper will receive the call and forward a call request to the remote gateway.

Answer: B

82. Refer to the exhibit. What will the H.323 gateways do when they receive a call request?

A. forward an admission request to the local gatekeeper

B. forward an admission request to the remote gatekeeper

C. send a location request to the remote gateway

D. send a location request to the remote gatekeeper

Answer: A

83. What is the term that is used to describe the process of converting a signal from digital to analog?

A. packetization

B. quantization

C. decoding

| English | Chinese(Traditional) | Chinese(Simplified) | - 30 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

D. sampling

Answer: C

84. Which two options can be used as traffic descriptors when classifying and marking traffic? (Choose

two.)

A. incoming interface

B. Layer 2 differentiated services code point (DSCP)

C. Layer 3 IP precedence

D. outgoing interface

Answer: AC

85. What are three problems with the tail drop mechanism of managing interface congestion? (Choose

three.)

A. Queuing introduces equal delays for packets of the same flow, resulting in jitter.

B. When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off

and then restart again.

C. All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer

starvation.

D. There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as

best-effort traffic.

E. In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A

router cannot handle multiple concurrent TCP sessions.

F. Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random

intervals in response to packet dropping.

Answer: BCD

86. Which two statements about WRED are true? (Choose two.)

A. WRED can selectively discard lower priority traffic when the interface becomes congested and can

provide differentiated performance characteristics for different classes of service.

B. Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.

| English | Chinese(Traditional) | Chinese(Simplified) | - 31 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

C. WRED will throttle back voice traffic only as a last resort.

D. If the average queue length is greater than the minimum threshold but less than the maximum

threshold, then based on the drop probability, WRED will either queue the packet or perform a random

drop.

E. WRED statistically drops more packets from low-bandwidth users than high-bandwidth users.

Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic

sources that generate the most traffic.

F. WRED treats non-IP traffic as precedence 4.

Answer: AD

87. Which two QoS classification and marking statements are true? (Choose two.)

A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.

B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet

are copied into the MPLS EXP field.

C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.

D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence

field in the header of an IP packet.

E. The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as

belonging to a specific CoS.

Answer: BE

88. Which two pairings match the application with the correct CoS value? (Choose two.)

A. CoS 0 = Best-Effort Data

B. CoS 1 = Best-Effort Data

C. CoS 3 = High Priority Data

D. CoS 4 = High Priority Data

E. CoS 5 = Voice Bearer

F. CoS 7 = Voice Bearer

Answer: AE

| English | Chinese(Traditional) | Chinese(Simplified) | - 32 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

89. Which two characteristics are common between traffic policing and traffic shaping? (Choose two.)

A. The rate of traffic is measured and compared to a configured policy.

B. Classification is used to differentiate traffic.

C. Traffic is marked and sent out according to priority.

D. Both can be applied to inbound and outbound traffic.

E. Both buffer traffic to ensure a predetermined traffic rate.

F. Both drop traffic that is above a predetermined traffic rate.

Answer: AB

90. Refer to the exhibit. The router receives an Ethernet frame that contains an IP datagram of 1500 bytes.

The packet will be forwarded if it conforms to the traffic policing policy that is applied outgoing on the serial

interface. Using single token-bucket class-based policing, which three settings would allow the entire

packet to be transmitted during time period T_c? Assume the token bucket is full of tokens. (Choose

three.)

A. CIR = 1.536 Mb/s, T_c = 100 msec

B. CIR = 1.536 Mb/s, T_c = 10 msec

C. CIR = 1.536 Mb/s, T_c = 1 msec

D. CIR = 512 Kb/s, T_c = 100 msec

E. CIR = 512 Kb/s, T_c = 10 msec

| English | Chinese(Traditional) | Chinese(Simplified) | - 33 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

F. CIR = 512 Kb/s, T_c = 1 msec

Answer: ABD

91. Which device is normally used to translate telephone numbers or names to IP addresses for call

routing in an H.323 network?

A. call agent

B. IP phone

C. multipoint control unit

D. gatekeeper

Answer: D

92. Refer to the exhibit. Which option correctly describes the order of signaling and call processing events

when a branch employee calls headquarters?

A. P,S,T,U

B. U,T,S,P

C. S,U,P,T

D. P,U,S,T

E. S,P,U,T

F. S,P,T,U

Answer: C

| English | Chinese(Traditional) | Chinese(Simplified) | - 34 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

93. Which three functions are associated with a Cisco Unified CallManager? (Choose three.)

A. connects traditional telephony devices to voice over IP infrastructure

B. converts analog signals to digital format

C. performs voice compression

D. performs call processing

E. performs dial plan administration

F. performs signaling and device control

Answer: DEF

94. For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? (Choose

three.)

A. Compress payload.

B. Use header compression.

C. Increase link capacity.

D. Use random early detection.

E. Guarantee bandwidth to fragile flows.

F. Implement network-based application recognition.

Answer: CDE

95. Refer to the exhibit. What is the maximum available bandwidth for the path between the workstation

and the server?

A. 256 kb/s

B. 512 kb/s

C. 1 Mb/s

| English | Chinese(Traditional) | Chinese(Simplified) | - 35 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

D. 10 Mb/s

E. 100 Mb/s

F. 110.768 Mb/s

Answer: A

96. Refer to the exhibit. What three actions can be taken to guarantee QoS for voice traffic? (Choose

three.)

A. Implement traffic policing on the ISP routers.

B. Prioritize traffic on customer routers.

C. Configure random early detection on the customer routers.

D. Implement TCP/RTP header compression on the links between the customer and ISP routers.

E. Implement network-based application recognition (NBAR) on the ISP routers.

F. Configure low latency queuing (LLQ) on the customer routers.

Answer: BDF

97. Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure?

(Choose two.)

A. Packets can arrive out of order.

B. Packets must take the same path to the destination.

C. Once packets are received at the destination router, the router performs sampling to ensure the quality

of the voice traffic.

D. Packets can experience varying delays across the network.

E. Packets containing voice samples are sequentially numbered by default, allowing for reordering upon

arrival at the terminal router along the path.

| English | Chinese(Traditional) | Chinese(Simplified) | - 36 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer: AD

98. Refer to the exhibit. A Wireless Location Appliance has been included in the wireless network. Which

statement is true about the location calculation process performed by the Location Appliance?

A. The access points (APs) collect and aggregate the received-signal-strength-indication (RSSI)

information from all Wi-Fi devices on the network and send it to the Location Appliance by way of the

Simple Network Management Protocol (SNMP).

B. The access points (APs) collect and aggregate the received-signal-strength-indication (RSSI)

information from all Wi-Fi devices on the network and send it to the Location Appliance through the

Lightweight Access Point Protocol (LWAPP).

C. The wireless LAN controllers aggregate the received-signal-strength-indication (RSSI) information

from the lightweight access points (APs) and send it to the Location Appliance by way of the Simple

Network Management Protocol (SNMP).

D. The wireless LAN controllers collect and aggregate the received-signal-strength-indication (RSSI)

information from all Wi-Fi devices on the network and send it to the Location Appliance through the

Lightweight Access Point Protocol (LWAPP).

Answer: C

99. What are the three models of quality of service (QoS) in a network?

A. Resource Reservation Protocol (RSVP)

B. first-in, first-out (FIFO)

| English | Chinese(Traditional) | Chinese(Simplified) | - 37 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

C. best-effort

D. CBWFQ

E. IntServ

F. DiffServ

Answer: CEF

100. Within the WMM policy, how many default QoS radio access categories are there?

A. 8

B. 5

C. 4

D. 3

Answer: C

101. What is an advantage of the IntServ QoS model?

A. It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of

the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).

B. RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object)

and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to

these individual flows.

C. RSVP streamlines communication by making it unnecessary to inform network devices of flow

parameters (IP addresses and port numbers).

D. Because of the stateful RSVP architecture, continuous signaling does not have to occur.

E. The flow-based approach is scalable to large implementations, such as the public Internet, because

RSVP tracks each individual flow.

Answer: A

102. Refer to the exhibit. On the basis of the information in the exhibit, where is LWAPP encapsulation

implemented?

| English | Chinese(Traditional) | Chinese(Simplified) | - 38 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. LWAPP encapsulation occurs between the WLAN access point and the wireless clients.

B. LWAPP encapsulation occurs between the wireless LAN controller and the wireless clients.

C. LWAPP encapsulation occurs between the wired switch and the wireless clients.

D. LWAPP encapsulation occurs between the wireless LAN controller and the WLAN access point.

E. LWAPP encapsulation occurs between the wired switch and the WLAN access point.

F. LWAPP encapsulation occurs between the wired switch and the wireless LAN controller.

Answer: D

103. Refer to the exhibit. Routers R1 and R2 are to be configured as VoIP gateways. On the basis of the

information in the exhibit, which dial peer configuration would be valid?

A. R1(config)# dial-peer voice 1 pots

R1(config-dial-peer)# destination-pattern 1111

| English | Chinese(Traditional) | Chinese(Simplified) | - 39 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

R1(config-dial-peer)# port 1/0/0

B. R1(config)# dial-peer voice 1 voip

R1(config-dial-peer)# destination-pattern 1111

R1(config-dial-peer)# port 1/0/0

C. R2(config)# dial-peer voice 1 pots

R2(config-dial-peer)# destination-pattern 1111

R2(config-dial-peer)# port 1/0/0

D. R2(config)# dial-peer voice 1 voip

R2(config-dial-peer)# destination-pattern 1111

R2(config-dial-peer)# port 1/0/0

Answer: A

104. Refer to the exhibit. Routers R1 and R2 are to be configured as VoIP gateways. On the basis of the

information in the exhibit, which dial peer configuration would be valid?

A. R1(config)# dial-peer voice 2 pots

R1(config-dial-peer)# destination-pattern 1111

R1(config-dial-peer)# session target ipv4:10.1.1.1

B. R1(config)# dial-peer voice 2 voip

R1(config-dial-peer)# destination-pattern 1111

R1(config-dial-peer)# session target ipv4:10.1.1.1

C. R2(config)# dial-peer voice 2 pots

R2(config-dial-peer)# destination-pattern 1111

R2(config-dial-peer)# session target ipv4:10.1.1.1

D. R2(config)# dial-peer voice 2 voip

R2(config-dial-peer)# destination-pattern 1111

| English | Chinese(Traditional) | Chinese(Simplified) | - 40 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

R2(config-dial-peer)# session target ipv4:10.1.1.1

Answer: D

105. SDM creates a low latency queuing (LLQ) service policy with its associated classes. What are the

two types of low latency queuing available using the SDM QoS wizard? (Choose two.)

A. FIFO queuing, which provides a means to hold packets while they are waiting to exit an interface

B. Priority queuing, which ensures a fixed amount of bandwidth

C. Custom queuing (CQ), which provides a queuing tool that services all queues, even during times of

congestion

D. Bandwidth queuing, which ensures a minimum amount of bandwidth

E. Weighted fair queuing (WFQ), which classifies packets based on flows

Answer: BD

106. Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)? (Choose

three.)

A. improved WLAN security

B. simplified AP deployment

C. dynamic RF management

D. on-demand location of rogue APs

E. system-wide control of status and alarm monitoring

F. automatic channel and power level adjustment

Answer: ABC

107. When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to

within what range is on-demand location of rogue APs possible?

A. 1 meter

B. 5 meters

C. 10 meters

D. 25 meters

E. 33 meters

| English | Chinese(Traditional) | Chinese(Simplified) | - 41 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer: C

108. Which three user interfaces exist for the Cisco WLAN Controllers? (Choose three.)

A. Wireless LAN Solution Engine (WLSE)

B. command-line interface (CLI)

C. Wireless Control System (WCS)

D. TFTP

E. an HTTPS web user interface

F. an HTTP web user interface

Answer: BCE

109. End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in

lieu of 802.1p?

A. IP precedence

B. type of service (ToS)

C. class of service (CoS)

D. differentiated services code point (DSCP)

Answer: D

110. The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two

statements indicate the default QoS parameters that are created by SDM? (Choose two.)

A. Business-critical traffic will be sorted into two QoS classes.

B. Real-time traffic will be sorted into one QoS class.

C. Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.

D. All traffic except real-time will be considered best-effort.

E. Routing, management, and transactional traffic will be considered business-critical.

F. Voice and call signaling traffic will be considered real-time.

Answer: EF

111. When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned

| English | Chinese(Traditional) | Chinese(Simplified) | - 42 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values

that are assigned by SDM for outgoing traffic on a WAN interface? (Choose three.)

A. Voice traffic will be assigned 47% of the interface bandwidth.

B. Voice call signaling will be assigned 33% of the interface bandwidth.

C. Telnet, SSH, and other traffic that is generated to manage the router is assigned 5% of the interface

bandwidth.

D. Best-effort traffic will be assigned 38% of the interface bandwidth.

E. Routing protocol traffic will be assigned 5% of the interface bandwidth.

F. Transactional traffic will be assigned 5% of the interface bandwidth.

Answer: CEF

112. Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?

A. CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP

network.

B. CAC is used to protect the quality of the voice calls by preventing call establishment if enough

resources are not available on the network.

C. CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted

rate.

D. In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly

implemented.

Answer: B

113. What can be used to maintain the voice quality on a link by limiting the number of calls that can be

active at any given time?

A. Call Management Link Agent

B. Traffic policing

C. Call Admission Control

D. QoS Link Congestion Management

E. Oversubscription Link Detection

Answer: C

| English | Chinese(Traditional) | Chinese(Simplified) | - 43 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

114. Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for

Survivable Remote Site Telephony? (Choose two.)

A. Analog phones, connected to the PSTN, act as internal call agents if IP communication to the

CallManager is lost.

B. An onsite gateway reroutes calls over the PSTN if IP communication to the CallManager is lost.

C. The IP phones can reroute calls over the PSTN if IP communication to the CallManager is lost.

D. Local voice gateways can assume the function of a call agent if IP communication to the CallManager

is lost.

E. IP phones use an internal call agent if IP communication to the CallManager is lost.

Answer: BD

115. Which two statements are correct about the signaling methods that are utilized for transmitting voice?

(Choose two.)

A. Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth

available for the voice data stream.

B. Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.

C. Common channel signaling transmits control signals in band and therefore reduces the bandwidth

available for the voice data stream.

D. Common channel signaling uses one of the TDM channels to transmit control information reducing the

number of channels available for voice.

E. ISDN BRIs implement channel-associated signaling.

Answer: AD

116. Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?

(Choose two.)

A. ISR can perform the functions of a multipoint control unit to facilitate voice conferencing.

B. ISR can perform the function of a call agent in the event of loss of communication with a CallManager.

C. ISR can provide XML applications to the phones.

D. ISR can provide all of the functionality of a CallManager in the event of loss of communication to the

| English | Chinese(Traditional) | Chinese(Simplified) | - 44 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

CallManager.

E. ISR can act as a voice gateway to the PSTN.

Answer: BE

117. Which three practices are important to the implementation of a DiffServ QoS architecture? (Choose

three.)

A. Because services are allocated throughout the network before the transmission of data begins, traffic

classes can be guaranteed QoS services.

B. Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic

classes.

C. Traffic classes are marked with Layer 3 markings to allow them to traverse different network types

without loss of QoS information.

D. Traffic classes allow networks to provide proper QoS treatment of packets without applications having

to request services.

E. Based upon the network capabilities, QoS markings are placed on packets as needed throughout the

network to allow for proper QoS treatment of packets.

F. QoS markings are placed on packets as close to the network edge as possible to allow distribution and

core devices to determine QoS actions as quickly as possible.

Answer: CDF

118. Refer to the exhibit. An IP packet, Ethernet frame, and MPLS frame are shown. Which two

statements are correct about the QoS marking relationships between them? (Choose two.)

| English | Chinese(Traditional) | Chinese(Simplified) | - 45 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. A provider MPLS network will utilize IP precedence, CoS or EXP bits to provide QoS service through

the provider network.

B. QoS markings from the Ethernet frame or IP packet will be mapped to MPLS EXP bits to allow for QoS

service to be continued through a provider network.

C. MPLS mappings by the provider will change the IP ToS bits as a packet traverses an MPLS network.

D. Some networks require Ethernet CoS bits to be mapped to IP ToS bits because end devices can only

mark at Layer 3.

E. Mapping CoS bits from the Ethernet frame to the IP ToS bits can be provisioned only at the edge of the

provider network.

Answer: BD

119. In the design of a QoS solution, which two factors should be taken into consideration? (Choose two.)

A. On congested links, all forms of traffic will require some form of QoS.

B. All traffic types and requirements should be examined to determine the number of traffic classes

required.

C. In the implementation of link efficiency mechanisms on links that typically transport relatively large

packets, header compression will be most efficient.

D. In the implementation of link efficiency mechanisms on links that typically transport relatively small

packets, header compression will be most efficient.

E. In the implementation of link efficiency mechanisms on links that typically transport relatively small

packets, payload compression will be most efficient.

F. Payload compression provides more available bandwidth and reduces processing delay time.

Answer: BD

120. In a VoIP network, which type of interface would an analog fax machine connect to?

A. Type 1

B. Type 2

C. FXS

D. FXO

E. E&M

| English | Chinese(Traditional) | Chinese(Simplified) | - 46 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer: C

121. Which set of steps represents the correct sequence a router would take when converting an analog

signal to a digital signal?

A. Step 1: quantization

Step 2: sampling

Step 3: encoding

B. Step 1: sampling

Step 2: encoding

Step 3: quantization

C. Step 1: quantization

Step 2: sampling

Step 3: encoding

D. Step 1: sampling

Step 2: quantization

Step 3: encoding

Answer: D

122. Which Control Plane Policing (CoPP) statement is true?

A. Traffic to be policed is identified using the control-plane global configuration command.

B. The control-plane global configuration command enters the Cisco Modular QoS CLI (MQC) mode.

C. The control-plane global configuration command enters the control-plane configuration mode.

D. Traffic to be policed is identified using the control-plane interface configuration command.

E. The control-plane interface configuration command enters the Cisco Modular QoS CLI (MQC) mode.

F. The control-plane interface configuration command enters the control-plane configuration mode.

Answer: C

123. Refer to the exhibit. The QoS policy will be applied outgoing on an interface. Based on the indicated

bandwidth allocation, which statement is true?

| English | Chinese(Traditional) | Chinese(Simplified) | - 47 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. Bandwidth allocation is set to default values.

B. This QoS policy will be applied to an Ethernet interface.

C. When traffic from an FTP session exceeds more than 25% of the outgoing bandwidth on the interface,

it will be dropped.

D. Voice traffic on the interface will restrict all remaining traffic to 50% of the bandwidth.

E. Real Time traffic will be allocated 50% of 50000 kb/s.

F. The three types of traffic must share the interface bandwidth.

Answer: F

124. Refer to the exhibit. Wireless security is based on IEEE 802.1x with WPA. Which three statements

are true? (Choose three.)

| English | Chinese(Traditional) | Chinese(Simplified) | - 48 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. The access point is an EAP supplicant.

B. The client is an EAP supplicant.

C. Client traffic will be encrypted by an AES cryptographic algorithm.

D. Client traffic will be encrypted by an RC4 cryptographic algorithm.

E. The client is operating in WPA personal mode.

F. The client is operating in WPA enterprise mode.

Answer: BDF

125. Refer to the exhibit. Wireless security is based on IEEE 802.1x with WPA2. Which two statements

are true? (Choose two.)

A. The access point is an EAP authenticator.

B. The client is an EAP authenticator.

C. Client traffic will be encrypted by an AES cryptographic algorithm.

D. Client traffic will be encrypted by TKIP.

E. Client authentication uses PSK.

Answer: AC

126. Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)?

A. Home, Configure, Location, and Monitor

B. Home, Configure, Monitor, and Refresh

C. Home, Monitor, Refresh, and Administration

| English | Chinese(Traditional) | Chinese(Simplified) | - 49 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

D. Monitor, Configure, Location, and Administration

E. Monitor, Configure, Refresh, and Administration

F. Monitor, Location, Refresh, and Administration

Answer: D

127. Which two commands should be entered on a WLAN controller to remove any residual

configuration?

A. Enter the clear controller command followed by the reload command.

B. Enter the clear controller command followed by the reset command.

C. Enter the clear controller command followed by the reset system command.

D. Enter the erase startup-config command followed by the reload command.

E. Enter the erase startup-config command followed by the reset command.

F. Enter the erase startup-config command followed by the reset system command.

Answer: B

128. Refer to the exhibit. Which two statements are true about the table that is displayed in the lower left

hand corner? (Choose two.)

A. This section is called the Alarm Monitor Area.

B. This section is called the Alarm Control Area.

| English | Chinese(Traditional) | Chinese(Simplified) | - 50 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

C. This section is called the System Status Area.

D. Orange alarms indicate a major alarm.

E. Red alarms indicate a major alarm.

F. Yellow alarms indicate no problems.

Answer: AD

129. Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority,

specified in the 802.11e standard?

A. gold, silver, bronze, and platinum

B. platinum, gold, silver, and bronze

C. titanium, gold, silver, and bronze

D. voice and video, best effort, background, and scavenger

E. voice, video, best effort, and background

F. voice, video, best effort, and scavenger

Answer: E

130. Which two statements about the Wi-Fi Multimedia (WMM) standard are true? (Choose two.)

A. Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the

wireless network first.

B. Packets that are not assigned to a specific access category are categorized by default as the

background access category.

C. The WMM standard was implemented after the 802.11e standard was approved to provide support for

non 802.11e devices.

D. WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.

E. WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access

classes.

Answer: DE

131. When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are

used to identify the access categories?

| English | Chinese(Traditional) | Chinese(Simplified) | - 51 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. platinum, gold, silver, and bronze

B. voice, gold, silver, and bronze

C. low delay, network critical, business, best effort

D. voice, video, background gold, background silver, and best effort

E. voice, video, best effort, and background

F. voice, video, best effort, background, and scavenger

Answer: A

132. Refer to the exhibit. Which two statements are correct about the implementation of QoS across the

WANs that are shown? (Choose two.)

A. QoS cannot be maintained across WAN A.

B. The service provider is not involved in providing QoS services in WAN A.

C. The service provider can provide QoS services through the cloud in WAN A.

D. QoS cannot be maintained across WAN B.

E. The service provider is not involved in providing QoS services in WAN B.

F. The service provider can provide QoS services through the cloud in WAN B.

Answer: BF

133. Refer to the exhibit. The network in the diagram has contracted with a service provider for the QoS

levels that are shown. Which statement is correct about the QoS requirements for the campus and remote

branch?

| English | Chinese(Traditional) | Chinese(Simplified) | - 52 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

A. Because adequate levels of service are provided across the WAN, campus and remote branch QoS

will not be required.

B. The enterprise campus can allow no more than 90 ms of delay, 10 ms of jitter, and 0.5% loss to

maintain adequate levels of QoS for voice.

C. The enterprise remote branch can allow no more than 90 ms of delay, 10 ms of jitter, and 0.5% loss to

maintain adequate levels of QoS for voice.

D. The enterprise campus plus the remote branch can allow no more than 90 ms of delay, 10 ms of jitter,

and 0.5% loss to maintain adequate levels of QoS for voice.

Answer: D

134. Which of the items stated is typically the most expensive method of improving QoS across WAN

links?

A. advanced queuing

B. data compression

C. header compression

D. increasing link capacity

Answer: D

| English | Chinese(Traditional) | Chinese(Simplified) | - 53 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

135. Which three functions can an Integrated Services Router perform in a VoIP network? (Choose three.)

A. voice stream mixing for conference calling

B. voice gateway

C. call admission control

D. analog or digital phone interfaces

E. XML application services

F. large scale dial plan application

Answer: BCD

136. Using the fewest commands possible, drag the commands on the left to the blanks on the right to

configure and apply a QoS policy that guarantees that voice packets receive 20 percent of the bandwidth

on the S0/1/0 interface.

Answer:

| English | Chinese(Traditional) | Chinese(Simplified) | - 54 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

137. To configure Control Plan Policing(CoPP) to deny Telnet access only from 10.1.1.1, drag the

commands on the left to the boxes on the right and place the commands in the proper order.

Answer:

138. Drag each descriptor on the left to the QoS model on the right to which the descriptor applies. Not all

descriptors apply.

| English | Chinese(Traditional) | Chinese(Simplified) | - 55 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer:

139. Drag the wireless 802.1e priority level groupings on the left to the appropriate Wi-Fi

Multimedia(WMM)access categories on the right.(Not all groupings will be used)

Answer:

| English | Chinese(Traditional) | Chinese(Simplified) | - 56 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

140. Drag each term on the left to its time definition on the right. There will be one term unused.

Answer:

141. Add a new wireless LAN controller (WLC) to the WCS wireless management server. From the left,

drag each procedure to its step sequence on the right.

| English | Chinese(Traditional) | Chinese(Simplified) | - 57 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Answer:

142. Drag each wireless EAP authentication protocol above to its definition below.

Answer:

| English | Chinese(Traditional) | Chinese(Simplified) | - 58 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

143. Drag each WLSE feature above to its benefit below.

Answer:

| English | Chinese(Traditional) | Chinese(Simplified) | - 59 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

144. Drag Drop Drag the steps required to convert compressed digital signals to analog signals to their

correct order on the right.

Answer:

| English | Chinese(Traditional) | Chinese(Simplified) | - 60 - ExamKings Information Co., Ltd. All rights reserved.
w
wwww
w..EExxaam
mkkiinnggss..ccoom
m

Latest Version
We are constantly reviewing our products. New material is added and old material is revised. Free

updates are available for 90 days after the purchase. You should check your member zone at TestInside

and update 3-4 days before the scheduled exam date.

Here is the procedure to get the latest version:

1: Go to http://www.EaxmKings.com

2: Log in the User Center

3:The latest versions of all purchased products are downloadable from here. Just click the links.

Feedback
If you spot a possible improvement then please let us know. We always interested in improving product

quality.

Feedback should be send to ExamKings@gmail.com. You should include the following: Exam number,

version, page number, question number, and your login Account.

Our experts will answer your mail promptly.

Explanations
This product does not include explanations at the moment. If you are interested in providing explanations

for this exam, please contact ExamKings@hotmail.com

| English | Chinese(Traditional) | Chinese(Simplified) | - 61 - ExamKings Information Co., Ltd. All rights reserved.