Question 16
In the H.323 protocol, which of the following protocols is used to negotiate the capabilities of the two parties ?
Question 17
Which of the following is correct about the encryption algorithm?
Question 18
Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data.
Question 19
The following commands are configured on the S3610 switch:
qos map-table dot1p-lp
import 1 export 5
interface Ethernet1/0/8
port link-mode bridge
port link-tpe trunk
port trunk permit vlan 1 to 2
qos trust dot1p
interface Ethernet1/0/7
port link-mode bridge
port link-tpe trunk
port trunk permit vlan 1 to 2
qos gts queue 5 cir 1950 cbs 2000000
Then when the flow rate is 10Mbps the vlan id is 2 and 802.1p preferred priority of 1 is the packet from the port E1 / 0/6 enters only port E1 / 0/7 when forwarding.
Then the following statement is correct
qos map-table dot1p-lp
import 1 export 5
interface Ethernet1/0/8
port link-mode bridge
port link-tpe trunk
port trunk permit vlan 1 to 2
qos trust dot1p
interface Ethernet1/0/7
port link-mode bridge
port link-tpe trunk
port trunk permit vlan 1 to 2
qos gts queue 5 cir 1950 cbs 2000000
Then when the flow rate is 10Mbps the vlan id is 2 and 802.1p preferred priority of 1 is the packet from the port E1 / 0/6 enters only port E1 / 0/7 when forwarding.
Then the following statement is correct
Question 20
The correct statement about asymmetric encryption algorithm is ____ .