Home » SWITCH 642-813 Q&As » Section 4 - Prepare Infrastructure » 642-813 Q&A – Prepare infrastructure to support advanced services (21-25)

642-813 Q&A – Prepare infrastructure to support advanced services (21-25)

Section4 – Prepare infrastructure to support advanced services

QUESTION NO: 21
Network topology exhibit:

21

You need to design a new VOIP network for the WAN. From the choices listed, which three are considered to be basic components of a VoIP network? (Select three)
A. software voice applications
B. multipoint control unit (MCU)
C. gatekeeper
D. call agent
E. interactive voice response (IVR) systems
F. softphones
Answer: B,C,D
Explanation:
For H.323 VOIP networks the ITU-T H.323 standard specifies four components: gateway gatekeeper terminal multipoint control unit (MCU)
For MGCP/SCCP VOIP networks the components that make up a VoIP system include a Signaling Gateway, Call Manager, Call Agent, and Media Gateway Controller.

QUESTION NO: 22
Refer to the exhibit. The wireless user is moving from right to left towards AP2. What are three reasons that the wireless client would initiate roaming? (Choose three.)

22
A. The client has missed too many beacons from AP1.
B. The client has received too many beacons from AP2.
C. The client data rate from AP1 has been reduced.
D. The client data rate from AP2 has been increased.
E. The maximum data retry count from AP1 is exceeded.
F. The minimum data retry count from AP1 is exceeded.
Answer: ACE
Explanation:
Roaming is always initiated by the client, and is not defined by IEEE standards. For Cisco clients, roaming is caused by one of the following events.
Maximum data retry count is exceeded
Missed too many beacons
Datarate shift
Initial startup
Periodic client interval (if configured)

QUESTION NO: 23
Under which three conditions does a client initiate roaming between wireless cells in the WLAN? (Select three)
A. The access point has broadcast too many SSIDs.
B. The wireless client has missed too many beacons from the access point.
C. The maximum data retry count, initiated by the wireless client, is exceeded.
D. The wireless client has reduced the data rate.
E. The access point has requested client reauthentication.
F. The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
Answer: BCD
Explanation:
See the explanation of question 22.

QUESTION NO: 24
Which of the characteristics below is associated with the (QoS) Integrated Services Model?
A. QoS classified at layer 3 using IP precedence or DSCP.
B. Guaranteed rate service.
C. Implemented using FIFO queues.
D. All traffic has an equal chance of being dropped.
Answer: B
Explanation:
Cisco IOS QoS includes the following features that provide controlled load service, which is a kind of integrated service:
Resource Reservation Protocol (RSVP) can be used by applications to signal their QoS requirements to the router.
Intelligent queuing mechanisms can be used with RSVP to provide the following kinds of services:

  • Guaranteed Rate Service, which allows applications to reserve bandwidth to meet their requirements. For example, a Voice over IP (VoIP) application can reserve 32 Mbps end to end using this kind of service. Cisco IOS QoS uses weighted fair queuing (WFQ) with RSVP to provide this kind of service.
  • Controlled Load Service, which allows applications to have low delay and high throughput even during times of congestion. For example, adaptive real-time applications such as playback of a recorded conference can use this kind of service. Cisco IOS QoS uses RSVP with Weighted Random Early Detection (WRED) to provide this kind of service.

QUESTION NO: 25
Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone? 

25
A. Effectively the trust boundary has been moved to the IP phone.
B. RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link.
C. The switch is rewriting packets it receives from the IP phone and determining theCoS value.
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set theCoS.
E. The host is now establishing theCoS value and has effectively become the trust boundary.
Answer: A
Explanation:
Configuring Trusted Boundary:
In a typical network, you connect a Cisco IP Phone to a switch port. Traffic sent from the telephone to the switch is typically marked with a tag that uses the 802.1Q header. The header contains the VLAN information and the CoS 3-bit field, which determines the priority of the packet.
For most Cisco IP Phone configurations, the traffic sent from the telephone to the switch is trusted to ensure that voice traffic is properly prioritized over other types of traffic in the network. By using the "mls qos trust cos" interface configuration command, you can configure the switch port to which the telephone is connected to trust the CoS labels of all traffic received on that port.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back