Refer to the exhibit. On basis of the configuration that is provided, where will the trust boundary be established in this network? ()
A.at the PC B.at the access switch C.at the IP phone D.at the distribution switch
You need to determine where the trust boundaries will be in a new Company VOIP design. Which two statements are true about these trust boundaries?()
A.Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings, B.Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification. C.Trust boundaries are used to determine which QoS mechanism will be applied to the traffic. D.At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network. E.Trust boundaries define the firewall rules for QoS admission into a network.
Refer to the exhibit. Based upon the information that is given, how will voice traffic from the phone and data traffic from the PC be handled by SW_1? ()
A.The switch port will perform marking for the ingress voice and data traffic by using the defaultCoS value at the switch port. B.The switch port will trust theCoS value of the ingress voice and data traffic that comes into the switch port. C.The switch port will trust theCoS value of the ingress voice traffic. Data traffic will be marked at the switch port with the default CoS value. D.The switch port will trust theCoS value of the ingress data traffic. Voice traffic will be marked at the switch port with the default CoS value.