A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
您可能感興趣的試卷
你可能感興趣的試題
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
A.The tunnel that is not configured with the policy-class command acts as the default
B.EXP selection is between multiple tunnels to the same destination
C.There is no requirement for IGP extensions
D.Tunnels are configured using the policy-class command and carry multiple EXP values
E.It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
A.VPI 16
B.DLCI
C.VPI and VCI
D.circuit number
E.PVC and SVC
A.never takes place
B.periodically
C.during switchover
D.after switchover
E.before switchover
A.It prevents message looping, Session Advertisement (SA)messages must be RPF checked
B.RPF check should be done against the route to the source S of the corresponding PIM-SM domain
C.RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
D.RPF checking Session Advertisement (SA) messages will cause message looping
最新試題
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()
In optical transmission systems, chirped lasers are used for the purpose of:().
Which statement about the use of Route Target Rewrite is true?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three protocols use TLVs to carry attributes?()
Which three things are the building blocks of the Cisco VPLS architecture?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()