A.LSA type 1
B.LSA type 2
C.LSA type 7
D.LSA type 3
E.LSA type 9
F.LSA type 5
您可能感興趣的試卷
你可能感興趣的試題
A.Packet mode
B.Frame mode
C.Transparent mode
D.Channel mode
E.Tunnel mode
A.It removes the top label in the MPLS label stack.
B.It adds a top label in MPLS label stack.
C.It replaces the top label in the MPLS label stack with another value.
D.It replaces the top label in the MPLS label stack with a set of labels.
E.None of above.
A.Wait-to-Restore,F(xiàn)orced Switch,Manual Switch,Lockout of Protection
B.Manual Switch,Wait-to-Restore,Lockout of Protection,F(xiàn)orced Switch
C.Lockout of Protection,F(xiàn)orced Switch, Manual Switch,Wait-to-Restore
D.Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore
E.Wait-to-Restore,Manual Switch,F(xiàn)orced Switch,Lockout of Protection
F.Wait-to-Restore,Manual Switch,Lockout of Protection,F(xiàn)orced Switch
A.239.0.0.1
B.239.255.255.255
C.224.0.0.10
D.224.0.0.5
A.Autoroute causes the tunnel to be treated as a directly connected link to the head-end.
B.Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel.
C.Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP.
D.Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.
A.It does not support all underlying unicast routing protocols like GBP
B.It supports shared trees only assuming all hosts want the multicast traffic
C.Receivers are registered with RP by their first-hop router
D.Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)
E.From the RP,traffic flows down a Source Tree to each receiver
A.Loop Management Protocol
B.Label Management Protocol
C.Load Management Protocol
D.Link Management Protocol
E.None of above
A.service timestamps log datetime
B.logging trap datetime
C.service logging datetime
D.logging datetime on
E.logging timestamps on
A.By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B.By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C.By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D.By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
A.LDP hello packets are sent to UDP port 646
B.LDP hello packets are sent to TCP port 711
C.LDP sessions are TCP sessions to port 646
D.LDP sessions are TCP sessions to port 711
E.LDP establishes a peer relationship with another router that must be directly attached
F.LDP can establishes a peer relationship with another router that is not directly attached
最新試題
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which three protocols use TLVs to carry attributes?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which option describes a benefits of IPv6 VPN Provider Edge?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()