单项选择题
A. The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PC attached to the IP phone.
B. The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer switch.
C. RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link.
D. Effectively, the trust boundary has been moved to the PC attached to the IP phone.
E. The computer is now establishing theCoS value and has effectively become the trust boundary.
单项选择题 Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()
多项选择题 You have configured voice VLANs on Catalyst switch R1. Which two statements are true about the operation of voice VLANs on this device? ()
单项选择题 Refer to the exhibit. Which statement is true about the configuration that is shown? ()