多項選擇題The Attribute field within the IS-IS LSP header contains which of the following flags? ()

A.IS-Type
B.Overload (LSPDBOL)
C.Pseudonode (PN)
D.Attached (ATT)
E.Fragment (Frag-Nr)
F.Partition (P)


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題Selective packet discard(SPD)operates in the following modes().

A.normal
B.select
C.random
D.discard
E.full

3.單項選擇題DSCP value "101110" looks like which IP Precedence value to non-DiffServ compliant devices?()

A.IP Precedence 2
B.IP Precedence 3
C.IP Precedence 4
D.IP Precedence 5
E.IP Precedence 6
F.IP Precedence 7

4.多項選擇題How do routers in an IS-IS Level-1 domain exit to reach other Level-1 (L1) domains?()

A.Level-1(L1) routers use default routes announced by Level-2(L2) routers in Level-1(L1) domain
B.Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcements from Level-1-2(L1/L2) router
C.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-1-2(L1/L2) by route-leaking feature of Cisco IOS
D.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-2(L2) by route-leaking feature of Cisco IOS

5.多項選擇題Which descriptions of Netflow is correct?()

A.By default,Netflow records bidirectional IP traffic flow.
B.Netflow answers questions regarding IP traffic:who,what,where,when,and how
C.Netflow accounts for both transit traffic and traffic destined for the router.
D.Netflow returns the subinterface information in the flow records.

6.多項選擇題Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? ()

A.PW capabilities list
B.Message type
C.Assigned control connection ID
D.PW type
E.Remote session ID
F.Hostname

7.單項選擇題What best describes the usage of Route-Target rewrite?()

A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.

8.多項選擇題Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()

A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics

9.單項選擇題What OSPF LSA is used to support MPLS-traffic Engineering ?()

A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )

10.多項選擇題Select the two answers that best describe the IP Event Dampening feature()

A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers

最新試題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題

What is the BGP synchronization rule?()

題型:單項選擇題

Which statement is FALSE concerning Concatenation?()

題型:單項選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:單項選擇題

Which statement about multicast VPN is true?()

題型:單項選擇題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:單項選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題