单项选择题
Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()
A.switchport priority extend trust
B.switchport priority extend cos 2
C.switchport priority extend cos 11
D.mls qos cos 2
E.mls qos cos 2 override
相关考题
-
多项选择题
WhichtwostatementsaboutvoiceVLANsarecorrect?()
A.Voice VLANs eliminate the need for QoS configuration
B.Voice VLANs are used on trunk links to eliminate the need for QoS CoS markings
C.Voice VLANs are mainly used to reduce the number of access switch ports that are used in the network
D.Voice VLANs can be configured to forward existing CoS priorities or override them
E.Voice VLANs are mainly used between access layer switches and distribution layer switches
F.Voice VLANs can be configured on Layer 2 ports only -
多项选择题
WhichtwostatementsaretrueaboutvoiceVLANs?()
A.Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
B.Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
C.Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
D.Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
E.Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
F.Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings -
单项选择题
Aclientissearchingforanaccesspoint(AP).Whatisthecorrectprocessorderthattheclientandaccesspointgothroughtocreateaconnection?()
A.probe request/response, authentication request/response, association request/response
B.association request/response, authentication request/response, probe request/response
C.probe request/response, association request/response, authentication request/response
D.association request/response, probe request/response, authentication request/response
