Search Header Logo

ENSA - Modules 9-12

Authored by Logan Prewitt

Computers

12th Grade

Used 5+ times

ENSA - Modules 9-12
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

72 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. What is the term used to indicate a variation of delay?

  • latency

  • serialization delay

  • speed mismatch

jitter

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?

  • jitter

latency

  • priority

  • bandwidth

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

3. What role do network devices play in the IntServ QoS model?

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

  • Network devices provide a best-effort approach to forwarding traffic.

  • Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive.

  • Network devices use QoS on a hop-by-hop basis to provide excellent scalability.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which device would be classified as a trusted endpoint?

  • switch

  • router

firewall

  • IP phone

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. What is the benefit of deploying Layer 3 QoS marking across an enterprise network?

Layer 3 marking can carry the QoS information end-to-end.

  • Layer 3 marking can carry QoS information on switches that are not IP aware.

  • Layer 3 marking can be carried in the 802.1Q fields.

  • Layer 3 marking can be used to carry non-IP traffic.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. What is the function of a QoS trust boundary?

  • A trust boundary identifies the location where traffic cannot be remarked.

  • A trust boundary only allows traffic to enter if it has previously been marked.

A trust boundary identifies which devices trust the marking on packets that enter a network.

  • A trust boundary only allows traffic from trusted endpoints to enter the network.

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

7. What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.)

  • Decrease buffer space.

  • Disable queuing mechanisms.

Drop lower-priority packets.

Prevent bursts of traffic.

Increase link capacity.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?