Which three statements are true about trust boundaries in the campus network? (Choose three.)
A.
Classification and marking occur using 802.1ab QoS bits before reaching the trust
boundary.
B.
A device is trusted if it correctly declassifies packets.
C.
A device is trusted if it correctly classifies packets.
D.
Network trust boundaries are automatically configured in IOS version 12.3 and later.
E.
The outermost trusted devices represent the trust boundary.
F.
For scalability, classification should be done as close to the edge as possible.
Explanation:
At the trust boundary device, QoS values are trusted if they accurately represent the type of
traffic and precedence processing the traffic should receive as it enters the campus network.
If untrusted, the traffic is marked with a new QoS value appropriate for the policy in place at
the point where the traffic entered the campus network. Ideally, the trust boundary exists at
the first switch receiving traffic from a device or IP phone. It is also acceptable to establish
the trust boundary where all the traffic from an access switch enters a Building Distribution
layer port.