單項選擇題What is jitter?()

A.The total end-to-end delay
B.The variations of delay.
C.The delay caused by placing the bits on the wire.
D.The time it takes for the bits to transit the physical media.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements regarding the IS-IS DIS election process are true? ()

A.A priority of 0 will prevent a router from becoming a DIS.
B.If the DIS becomes unavailable the backup DIS is promoted to DIS.
C.Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.Separate L1 and L2 election processes are held on a brodcast network.
E.L1 routers on a broadcast network only establish adjacencies with the DIS.
F.If there is a tie based on priority,the router whose attached interface has the lowest MAC address becomes the DIS.

3.單項選擇題What is the port number of an IPsec Encapsulating Security Payload packet?()

A.IP protocol 50
B.IP protocol 51
C.TCP port 50
D.TCP port 51
E.UDP port 50
F.UDP port 51

4.多項選擇題In PPPoA architecture, which two methods are most commonly deployed?()

A.terminating PPP sessions at the service provider
B.PPP framing
C.PPP multiplexing
D.GRE tunneling
E.L2TP tunneling

5.單項選擇題What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?()

A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local

7.多項選擇題Which two statements about EIGRP are true?()

A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

8.多項選擇題Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()

A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling

9.單項選擇題In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?()

A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address

10.單項選擇題Which statement about Remotely Triggered Black Hole (RTBH) is true?()

A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface