Qos Quiz

Approved & Edited by ProProfs Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 78,662
Questions: 18 | Attempts: 2,459

SettingsSettingsSettings
Qos Quiz - Quiz

By IMS Asia (https://www. Imsasia. Com)


Questions and Answers
  • 1. 

    Quality of Service can alleviate which problems?

    • A.

      Insufficient Bandwidth

    • B.

      Link Instability

    • C.

      Dropped voice calls during periods of high network utilisation

    • D.

      Interface buffer overruns

    Correct Answer
    C. Dropped voice calls during periods of high network utilisation
    Explanation
    Quality of Service (QoS) can alleviate the problem of dropped voice calls during periods of high network utilization. QoS ensures that voice traffic is given priority over other types of data traffic, such as file downloads or web browsing, in order to maintain a consistent and reliable connection for voice calls. By prioritizing voice traffic, QoS helps to minimize packet loss and latency, which are the main causes of dropped calls. This ensures that voice calls remain stable and clear even during times of high network congestion or utilization.

    Rate this question:

  • 2. 

    Scheduler policies are applied to which interfaces?

    • A.

      Ingress Interfaces Only

    • B.

      Ingress and Egress Interfaces

    • C.

      Loopback Interfaces

    • D.

      Egress interfaces Only

    Correct Answer
    D. Egress interfaces Only
    Explanation
    Scheduler policies are only applied to egress interfaces. Egress interfaces are responsible for transmitting data from the device to the network, while ingress interfaces handle incoming data. By applying scheduler policies to egress interfaces, network administrators can control the rate at which data is transmitted and prioritize certain types of traffic. This allows for better management of network resources and ensures that critical traffic receives the necessary bandwidth.

    Rate this question:

  • 3. 

    Which of the following are defined forwarding classes? (choose two)

    • A.

      Best Effort

    • B.

      Assured Routing

    • C.

      Expedited Forwarding

    • D.

      Network Access

    Correct Answer(s)
    A. Best Effort
    C. Expedited Forwarding
    Explanation
    The correct answer is Best Effort and Expedited Forwarding. These two options are defined forwarding classes. Best Effort refers to the default forwarding class that provides no specific guarantees for packet delivery. Expedited Forwarding, on the other hand, is a forwarding class that ensures low latency and low loss for certain types of traffic, such as voice or video data. Both of these forwarding classes are commonly used in network communication to prioritize and manage different types of traffic.

    Rate this question:

  • 4. 

    How many bits are used for QOS in the MPLS Header?

    • A.

      1

    • B.

      3

    • C.

      8

    • D.

      32

    Correct Answer
    B. 3
    Explanation
    The MPLS header uses 3 bits for QoS. These bits are used to prioritize different types of traffic in a network. By assigning different levels of priority to packets, the network can ensure that high-priority traffic, such as voice or video data, is given preferential treatment and is delivered with minimal delay or loss. Using 3 bits allows for 8 different levels of priority to be assigned, providing enough granularity to effectively manage QoS in the network.

    Rate this question:

  • 5. 

    QOS is useful only if VOIP is used in the network.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    QoS (Quality of Service) is not solely useful only if VOIP (Voice over IP) is used in the network. QoS is a network management technique that prioritizes certain types of network traffic to ensure a consistent and reliable user experience. While VOIP can greatly benefit from QoS to maintain voice quality and minimize latency, other applications such as video streaming, online gaming, and real-time data transfer can also benefit from QoS. Therefore, QoS is not exclusively dependent on the presence of VOIP in the network.

    Rate this question:

  • 6. 

    Which of the following terms is used to describe the time it takes to actually transmit a packet on a link?

    • A.

      Encoding delay

    • B.

      Processing delay

    • C.

      Serialization delay

    • D.

      Transmission delay

    Correct Answer
    C. Serialization delay
    Explanation
    Serialization delay is the time it takes to transmit a packet on a link. This delay occurs because data is transmitted sequentially, one bit at a time, over the link. The larger the packet size, the longer it takes to transmit the entire packet. Therefore, serialization delay is directly proportional to the packet size and the link's transmission rate.

    Rate this question:

  • 7. 

    Which of the following are correct statements regarding DSCP?

    • A.

      The three least significant bits specify the drop probability.

    • B.

      The 8 TOS bits are used for DSCP.

    • C.

      To convert DSCP to IP Precedence, the three highest bits are matched.

    • D.

      DSCP provides for up to 8 precedence levels, with two drop probabilities.

    Correct Answer(s)
    A. The three least significant bits specify the drop probability.
    C. To convert DSCP to IP Precedence, the three highest bits are matched.
    Explanation
    The first statement is correct because the three least significant bits in the DSCP field are used to specify the drop probability. The second statement is incorrect because the DSCP field consists of the 6 most significant bits of the TOS (Type of Service) field, not all 8 bits. The third statement is correct because to convert DSCP to IP Precedence, the three highest bits in the DSCP field are matched. The fourth statement is incorrect because DSCP provides for up to 64 (not 8) different precedence levels, with four (not two) drop probabilities.

    Rate this question:

  • 8. 

    Which of the following could you match on as part of a multifield classifier?

    • A.

      Source and Destination Address

    • B.

      Source or Destination Port

    • C.

      Advertising Router

    • D.

      IP TTL

    Correct Answer(s)
    A. Source and Destination Address
    B. Source or Destination Port
    Explanation
    A multifield classifier is used to classify network traffic based on multiple fields of a packet. In this case, the fields that can be matched on are the Source and Destination Address, as well as the Source or Destination Port. These fields provide information about the source and destination of the network traffic, as well as the specific port being used. By matching on these fields, the classifier can categorize the network traffic based on these criteria. The Advertising Router and IP TTL fields are not mentioned as options for matching in this question.

    Rate this question:

  • 9. 

    The QoS requirements on the CE and PE router differ depending on which factor?

    • A.

      Whether or not the PE router is managed by the service provider

    • B.

      Whether or not the CE router is managed by the service provider

    • C.

      Whether or not the service provider is using an MPLS core

    • D.

      The SLAs offered by the service provider

    Correct Answer
    B. Whether or not the CE router is managed by the service provider
    Explanation
    The QoS requirements on the CE and PE router differ depending on whether or not the CE router is managed by the service provider. If the CE router is managed by the service provider, they have control over the configuration and management of the router, allowing them to implement QoS policies according to their own requirements. However, if the CE router is not managed by the service provider, they have limited control over the router's configuration and management, making it more challenging to implement specific QoS policies.

    Rate this question:

  • 10. 

    What mathematical model is used by traffic policing mechanisms to meter traffic?

    • A.

      Token bucket

    • B.

      RED

    • C.

      FIFO metering

    • D.

      Predictor or stacker

    Correct Answer
    A. Token bucket
    Explanation
    Traffic policing mechanisms use the token bucket mathematical model to meter traffic. In this model, tokens are placed in a bucket at a fixed rate. Each packet of traffic requires a certain number of tokens to be sent. If there are enough tokens in the bucket, the packet is allowed to be sent. If there are not enough tokens, the packet is either dropped or marked for a lower priority. This model helps in controlling the rate of traffic and preventing congestion in a network.

    Rate this question:

  • 11. 

    What is the main advantag of using multiaction policing?

    • A.

      To distinguish between exceeding and violating traffic

    • B.

      To distinguish between conforming and exceeding traffic

    • C.

      To allow the setting of both Layer 2 and Layer 3 QOS markers at the same time

    • D.

      To allow marking of the traffic before transmission

    Correct Answer
    C. To allow the setting of both Layer 2 and Layer 3 QOS markers at the same time
    Explanation
    Multiaction policing allows the setting of both Layer 2 and Layer 3 QOS markers at the same time. This means that it provides the advantage of being able to prioritize and manage network traffic at multiple levels simultaneously. By setting both Layer 2 and Layer 3 QOS markers, the network can prioritize different types of traffic based on their specific requirements, ensuring efficient and effective traffic management. This allows for better control and optimization of network resources, resulting in improved overall network performance.

    Rate this question:

  • 12. 

    Which two statements about FRF.12 and FRF.11 Annex C are correct?

    • A.

      FRF.12 fragmentation is used on DLCIs configured for VoIP

    • B.

      FRF.12 fragmentation is used on DLCIs configured for VoFR

    • C.

      FRF.11 Annex C fragmentation is used on DLCIs configured for VoIP

    • D.

      FRF.11 Annex C fragmentation is used on DLCIs configured for VoFR

    Correct Answer(s)
    A. FRF.12 fragmentation is used on DLCIs configured for VoIP
    D. FRF.11 Annex C fragmentation is used on DLCIs configured for VoFR
    Explanation
    FRF.12 fragmentation is used on DLCIs configured for VoIP because FRF.12 is a fragmentation and interleaving technique specifically designed for VoIP traffic. It helps to reduce delay and jitter by breaking up large packets into smaller fragments.

    FRF.11 Annex C fragmentation is used on DLCIs configured for VoFR because FRF.11 Annex C is a fragmentation and interleaving technique specifically designed for VoFR (Voice over Frame Relay) traffic. It helps to ensure the efficient transmission of voice packets over a Frame Relay network by breaking them into smaller fragments.

    Rate this question:

  • 13. 

    Which of the following is NOT used for Quality of Service?

    • A.

      DSCP bits.

    • B.

      MPLS EXP bits.

    • C.

      802.1X

    • D.

      802.1P

    Correct Answer
    C. 802.1X
    Explanation
    802.1X is a protocol used for network access control and authentication, not for Quality of Service (QoS) management. QoS is typically achieved using mechanisms such as DSCP bits and MPLS EXP bits, which prioritize and classify network traffic. 802.1P is also used for QoS, as it defines the priority levels for Ethernet frames.

    Rate this question:

  • 14. 

    Which of the following are examples of metrics for QOS?

    • A.

      Jitter, Delay, Packet-loss.

    • B.

      Latency, WRED, Attenuation.

    • C.

      AIS, Latency, NEXT.

    • D.

      SNR, Delay, WRED.

    Correct Answer
    A. Jitter, Delay, Packet-loss.
    Explanation
    Jitter, Delay, and Packet-loss are all examples of metrics for Quality of Service (QoS). Jitter refers to the variation in the delay of received packets, which can cause disruptions in real-time applications. Delay is the time it takes for packets to travel from the source to the destination, and it is important to minimize delay for efficient communication. Packet-loss is the percentage of packets that are lost during transmission, and it is crucial to keep this value low for reliable data transfer. Therefore, these three metrics are commonly used to measure and monitor the performance of a network's QoS.

    Rate this question:

  • 15. 

    Which of the following QOS functions are performed on the incoming interface?

    • A.

      Packet Scheduling

    • B.

      Congestion Management

    • C.

      Packet Classification

    • D.

      Buffer Management

    Correct Answer
    C. Packet Classification
    Explanation
    Packet classification is a QoS function performed on the incoming interface. It involves categorizing packets into different classes based on specific criteria such as source or destination IP address, protocol type, or port number. This classification allows for the application of different QoS policies and treatments to different classes of packets, ensuring that each packet receives the appropriate level of service based on its classification.

    Rate this question:

  • 16. 

    ICMP Echo-Request and Echo-Reply packets are treated as Network Control traffic?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    ICMP Echo-Request and Echo-Reply packets are not treated as Network Control traffic. ICMP (Internet Control Message Protocol) is a network layer protocol used for diagnostic and error reporting purposes. While ICMP packets are used to send Echo-Request and Echo-Reply messages for network troubleshooting (commonly known as "ping"), they are not considered Network Control traffic. Network Control traffic refers to the traffic that is used for the management and control of the network itself, such as routing protocols and network management protocols. ICMP packets, including Echo-Request and Echo-Reply, are considered part of the data traffic.

    Rate this question:

  • 17. 

    Which transport layer protocol is used for voice traffic?

    • A.

      UDP

    • B.

      TCP

    • C.

      XNS

    • D.

      HTTP

    Correct Answer
    A. UDP
    Explanation
    UDP (User Datagram Protocol) is the correct answer because it is commonly used for real-time applications such as voice traffic. UDP is a connectionless protocol that provides low-latency and fast communication, making it suitable for time-sensitive data like voice packets. Unlike TCP, UDP does not provide error checking or retransmission of lost packets, but for voice traffic, where a small delay is acceptable, UDP's speed and simplicity make it a preferred choice. XNS, TCP, and HTTP are not specifically designed for real-time communication and are less commonly used for voice traffic.

    Rate this question:

  • 18. 

    Which three are QoS requirements for voice?

    • A.

      Latency less that 150 ms

    • B.

      Jitter less than 30 ms

    • C.

      Loss less than 1 percent

    • D.

      Bandwidth 80kbps per call minimum for all codecs

    • E.

      Retransmit interval less than 10 ms

    Correct Answer(s)
    A. Latency less that 150 ms
    B. Jitter less than 30 ms
    C. Loss less than 1 percent
    Explanation
    The three QoS requirements for voice are latency less than 150 ms, jitter less than 30 ms, and loss less than 1 percent. These requirements are necessary for ensuring a high-quality voice communication experience. Latency refers to the delay in transmitting voice packets, and a latency of less than 150 ms ensures real-time communication. Jitter is the variation in latency, and a jitter of less than 30 ms ensures consistent voice quality. Loss refers to the percentage of voice packets that are not successfully delivered, and a loss of less than 1 percent ensures minimal disruptions in the voice communication.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2011
    Quiz Created by
    Apalani
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.