A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )
您可能感興趣的試卷
你可能感興趣的試題
A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers
A.ATT(Attached)bit
B.IS-Type bits
C.P(Partition)bit
D.Down bit
E.PN(Pseudonode)biy
F.ABR(Area Border Rorter)bit
A.The total end-to-end delay
B.The variations of delay.
C.The delay caused by placing the bits on the wire.
D.The time it takes for the bits to transit the physical media.
A.A priority of 0 will prevent a router from becoming a DIS.
B.If the DIS becomes unavailable the backup DIS is promoted to DIS.
C.Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.Separate L1 and L2 election processes are held on a brodcast network.
E.L1 routers on a broadcast network only establish adjacencies with the DIS.
F.If there is a tie based on priority,the router whose attached interface has the lowest MAC address becomes the DIS.
A.Custom Queueing
B.CB-WRED
C.WRR Queueing
D.LLQ
E.CBWFQ
A.IP protocol 50
B.IP protocol 51
C.TCP port 50
D.TCP port 51
E.UDP port 50
F.UDP port 51
A.terminating PPP sessions at the service provider
B.PPP framing
C.PPP multiplexing
D.GRE tunneling
E.L2TP tunneling
A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local
A.LSP
B.PSNP
C.ISH
D.CSNP
E.IIH
A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
最新試題
What are three common reasons for ATM CRC errors?()
Which two statements about DS-Lite are true?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()