A.Level-1(L1) routers use default routes announced by Level-2(L2) routers in Level-1(L1) domain
B.Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcements from Level-1-2(L1/L2) router
C.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-1-2(L1/L2) by route-leaking feature of Cisco IOS
D.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-2(L2) by route-leaking feature of Cisco IOS
您可能感興趣的試卷
你可能感興趣的試題
A.By default,Netflow records bidirectional IP traffic flow.
B.Netflow answers questions regarding IP traffic:who,what,where,when,and how
C.Netflow accounts for both transit traffic and traffic destined for the router.
D.Netflow returns the subinterface information in the flow records.
A.PW capabilities list
B.Message type
C.Assigned control connection ID
D.PW type
E.Remote session ID
F.Hostname
A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.
A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics
A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )
A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers
A.ATT(Attached)bit
B.IS-Type bits
C.P(Partition)bit
D.Down bit
E.PN(Pseudonode)biy
F.ABR(Area Border Rorter)bit
A.The total end-to-end delay
B.The variations of delay.
C.The delay caused by placing the bits on the wire.
D.The time it takes for the bits to transit the physical media.
A.A priority of 0 will prevent a router from becoming a DIS.
B.If the DIS becomes unavailable the backup DIS is promoted to DIS.
C.Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.Separate L1 and L2 election processes are held on a brodcast network.
E.L1 routers on a broadcast network only establish adjacencies with the DIS.
F.If there is a tie based on priority,the router whose attached interface has the lowest MAC address becomes the DIS.
A.Custom Queueing
B.CB-WRED
C.WRR Queueing
D.LLQ
E.CBWFQ
最新試題
In optical transmission systems, chirped lasers are used for the purpose of:().
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which three protocols use TLVs to carry attributes?()
Which two routers support cable access?()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which statement is FALSE concerning Concatenation?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()