A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth
您可能感興趣的試卷
你可能感興趣的試題
A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above
A.GFC-4 bits of generic flow control
B.Forward-explicit congestion notification(FECN)
C.VCI-16 bits of virtual channel identifier
D.CLP-1 bit of congestion loss
E.HEC-8 bit of header error control
F.ATM Discard Eligibility(DE)bit
A.lowest cost
B.highest bandwidth
C.lowest hop-count
D.path attributes
E.lowest delay
A.It prevents message looping,Session Advertisement(SA)messages must be RPF checked
B.RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
C.RPF checking Session Advertisement(SA)messages will cause message looping
D.RPF check should be done against the route to the source S of the corresponding PIM-SM domain
A.LDP and RSVP
B.RSVP and CEF
C.CEF and the FIB table
D.UDP and IP
E.A and B
A.LSA type 1
B.LSA type 2
C.LSA type 7
D.LSA type 3
E.LSA type 9
F.LSA type 5
A.Packet mode
B.Frame mode
C.Transparent mode
D.Channel mode
E.Tunnel mode
A.It removes the top label in the MPLS label stack.
B.It adds a top label in MPLS label stack.
C.It replaces the top label in the MPLS label stack with another value.
D.It replaces the top label in the MPLS label stack with a set of labels.
E.None of above.
A.Wait-to-Restore,F(xiàn)orced Switch,Manual Switch,Lockout of Protection
B.Manual Switch,Wait-to-Restore,Lockout of Protection,F(xiàn)orced Switch
C.Lockout of Protection,F(xiàn)orced Switch, Manual Switch,Wait-to-Restore
D.Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore
E.Wait-to-Restore,Manual Switch,F(xiàn)orced Switch,Lockout of Protection
F.Wait-to-Restore,Manual Switch,Lockout of Protection,F(xiàn)orced Switch
A.239.0.0.1
B.239.255.255.255
C.224.0.0.10
D.224.0.0.5
最新試題
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Which three things are the building blocks of the Cisco VPLS architecture?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which statement is FALSE concerning Concatenation?()