Voice over IP is an application that requires efficient use of bandwidth and reliability. VoIP must not suffer the delays that can be seen at times with Web sites and Web applications. Which technology can be used to help ensure the efficient transport of VoIP traffic?
Which of the following are examples of interactive communication? Each correct answer represents a complete solution. Choose all that apply.
A. Video Conferencing
D. Phone call
Which of the following devices is used to create VLANs in a small network?
Which of the following protocols provides sequence numbers to VoIP packets?
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.
A. Not broadcasting SSID
B. MAC filtering the router
C. Using WEP encryption
D. Using WPA encryption
Which of the following protocols is used by VoIP applications for communication initiation in the network?
Which of the following standards designates international numbering plans for devices connected to the PSTN?
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
Andrew is working for a television station in North America and South America. What video standard is more possibly be used with the video stored in the archives of these stations?
D. IEEE 1394
Which of the following layers of the OSI model manages communication between communication entities in a network?
When a phone is lifted off-hook, it connects the two wires causing an electrical signal to flow from the phone exchange to the phone. What is this electrical signal called?
A. Off-hook signal
B. Ground start signal
C. Loop start signal
D. On-hook signal
Trace analysis tools, management tools, and NBAR are used while implementing QoS policies. Which of the following tasks is performed by these tools during implementation of QoS policies?
A. Defining policies
B. Network audit
C. Network security configuration
D. Division of traffic into classes
Andrew has received a call from a user on a land line indicating that she cannot place calls with her VoIP softphone, but she can check her e-mail. What is the first step that Andrew should take to resolve this problem?
A. Execute ping command on her PC.
B. Log the problem.
C. Execute the ipconfig command on her PC.
D. Instruct her to ping the call manager.
Which of the following layers of the OSI model is responsible for converting between ASCII and EBCDIC?
A. Network Layer
B. Presentation Layer
C. Transport Layer
D. Application Layer
Which of the following types of attack can guess a hashed password?
A. Evasion attack
B. Denial of Service attack
C. Teardrop attack
D. Brute force attack
Passing your CompTIA CN0-201 Exam by using the latest CompTIA CN0-201 Exam Dump Full Version: http://www.braindump2go.com/cno-201.html