Which of the following are examples of interactive communication? Each correct answer represents a complete solution. Choose all that apply.
A. Video Conferencing
B. E-mail
C. Fax
D. Phone call
Which of the following protocols provides sequence numbers to VoIP packets?
A. TCP
B. RTP
C. UDP
D. SCCP
Which of the following ports must be opened on the firewall for the VPN connection using the Point-to-Point Tunneling Protocol (PPTP)?
A. TCP port 53
B. TCP port 443
C. TCP port 563
D. TCP port 1723
Which of the following protocols is used for Voice over IP (VOIP) solutions?
A. MGCP
B. RTMP
C. RTSP
D. RTP
Harry works as a Technician for KBC Inc. He has just installed a wireless access point that he plans to use for voice and video calls. Which of the following is an essential setting to put in place so that Harry can prioritize multiple traffic streams?
A. MAC address filtering
B. Multiple SSID entries
C. Larger MTU settings
D. Multiple default gateways
QoS (Quality of service) is the ability of the network to provide better or special service to a set of users and applications at the expense of other users and applications. QoS is deployed for network enhancement.
Which of the following is NOT affected by QoS?
A. Variable delay
B. Packet loss
C. Fixed delay
D. Jitter
John works as a Sales Engineer for KBC Inc. He has been assigned a project to install a soft phone on different computers. One of the computer systems on the LAN is experiencing problems in voice quality.
Which of the following actions should John perform to resolve the problem?
A. Upgrade the Network Interface Card (NIC).
B. Upgrade the computer system.
C. Add more system RAM.
D. Upgrade the network cable to category 6 cabling.
Which of the following standards defines call intrusion supplementary service?
A. H.450.10
B. H.450.12
C. H.450.9
D. H.450.11
Which of the following DoS attacks attempts to block service or reduce activity on a host by sending ping requests directly to the victim?
A. Teardrop attack
B. Ping flood attack
C. Land attack
D. SYN flood attack
Which of the following ITU recommendations explains the standard for store-and-forward fax transmission over IP networks?
A. Q.931
B. S.47
C. T.37
D. T.38