A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling
您可能感興趣的試卷
你可能感興趣的試題
A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address
A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
A.The tunnel that is not configured with the policy-class command acts as the default
B.EXP selection is between multiple tunnels to the same destination
C.There is no requirement for IGP extensions
D.Tunnels are configured using the policy-class command and carry multiple EXP values
E.It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
A.VPI 16
B.DLCI
C.VPI and VCI
D.circuit number
E.PVC and SVC
最新試題
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which statement about the use of Route Target Rewrite is true?()
Which option describes a benefits of IPv6 VPN Provider Edge?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which statement about multicast VPN is true?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()