多項(xiàng)選擇題SONET’s three layers are().

A.Section
B.Line
C.Frame
D.Path
E.DS1


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which of the following descriptions about IP spoofing is correct?()

A.IP source address is forged
B.IP destination address is forged
C.IP TCP source port is forged
D.IP TCP destination port is forged
E.None of above

2.多項(xiàng)選擇題Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()

A.MP-BGP routing
B.Static routing
C.Policy routing
D.Autoroute
E.Forwarding adjacency

3.單項(xiàng)選擇題With VPLS, which protocol is used for label exchange and PW signalling?()

A.MP-BGP
B.LDP
C.Directed LDP
D.MTP
E.BGP
F.IGP

4.單項(xiàng)選擇題When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategyworks the best?()

A.Deploy IPv6 at the Edges and tunnel Enterprise through the core
B.Deploy IPv6 at Edges and Core at the same time for smooth transition
C.Deploy IPv6 at the core first and then move to Edges toward the end customer
D.None of the above will work

6.單項(xiàng)選擇題

Based on the following output in a router A running LDP, which statement is true?()

A.None of the above.
B.The IP address 50.0.0.1/32 is assigned to the non-directly connected LDP neighbor, 50.0.0.4.
C.The IP address 50.0.0.1/32 is assigned to one of its own interfaces.
D.The IP address 50.0.0.1/32 is assigned to its directly connected LDP neighbor, 50.0.0.4.

7.多項(xiàng)選擇題Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()

A.Configure OSPF between trigger router and black hole routes
B.Configure all edge routers with static (reserved) host route to Null0
C.Configure BGP beteen trigger and black hole routers
D.Configure on trigger router to advertise victim host route with commumity
E.Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge routers

8.多項(xiàng)選擇題Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()

A.CoPP protects against IP spoofing;Racl protects against DoS attacks.
B.CoPP can not use named access lists;Racl can use named access lists
C.CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.
D.CoPP needs a AAA server,Racl does not need a AAA server
E.CoPP supports rate limits;Racl does not support rate limits

10.多項(xiàng)選擇題The Attribute field within the IS-IS LSP header contains which of the following flags? ()

A.IS-Type
B.Overload (LSPDBOL)
C.Pseudonode (PN)
D.Attached (ATT)
E.Fragment (Frag-Nr)
F.Partition (P)

最新試題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:?jiǎn)雾?xiàng)選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項(xiàng)選擇題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:?jiǎn)雾?xiàng)選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:?jiǎn)雾?xiàng)選擇題

What is the BGP synchronization rule?()

題型:?jiǎn)雾?xiàng)選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about Layer 3 MPLS VPN are true?()

題型:多項(xiàng)選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:?jiǎn)雾?xiàng)選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:?jiǎn)雾?xiàng)選擇題