A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
您可能感興趣的試卷
你可能感興趣的試題
A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling
A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address
A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
A.The tunnel that is not configured with the policy-class command acts as the default
B.EXP selection is between multiple tunnels to the same destination
C.There is no requirement for IGP extensions
D.Tunnels are configured using the policy-class command and carry multiple EXP values
E.It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
A.VPI 16
B.DLCI
C.VPI and VCI
D.circuit number
E.PVC and SVC
A.never takes place
B.periodically
C.during switchover
D.after switchover
E.before switchover
A.It prevents message looping, Session Advertisement (SA)messages must be RPF checked
B.RPF check should be done against the route to the source S of the corresponding PIM-SM domain
C.RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
D.RPF checking Session Advertisement (SA) messages will cause message looping
A.The VPNv6 address is a 96-bit route distinguisher and a 128-brt IPv6 address
B.The VPNv6 address is a 64-bit route distinguisher and a 128-bit IPv6 address
C.The VPNv6 address is a 64-brt route distinguisher and a 96-brt IPv6 address
D.The VPMv6 address is a 96-brt route distinguisher and a 96-bit IPv6 address
E.The VPNv6 address is a 128-bit route distinguisher and a 128-brt IPv6 address
A.NAP and NSP provide secure access to corporate gateways without managing end-to-end PVCs.NAP and NSP use Layer 3 routing,Layer 2 Forwarding,or Layer 2 Tunneling Protocol tunnels.Hence,they can scale their business models for selling wholesale service
B.The NSP can oversubscribe by deploying idle and session timeouts using an industry standard RADIUS server for each subscriber
C.Only a single session per CPE on one virtual channel (VC).The username and password are configured on the CPE, so all users behind the CPE for that particular VC can access only one set ofservices. Users cannot select different sets of services, although using multiple VCs and establishing different PPP session on different VCs is possible
D.If a single IP address is provided to the CPE, and NAT or PAT is implemented,certain applications such as IPTV,which embed IP information in the payload, well not work. Additionally,if an IP subnet feature is used,an IP address also has to be reserved for the CPE
E.PPPoA can use the features on the Cisco Service Selection Gateway (SSG)
最新試題
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
What is the BGP synchronization rule?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which two routers support cable access?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which three protocols use TLVs to carry attributes?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which statement about multicast VPN is true?()