單項選擇題Which option describes the incorrect usage of the Label Distribution method?()

A.LDP is primarily used in internal networks of MPLS-VPN providers.
B.MP-BGP is used for label distribution for VPN customer routes.
C.Directed LDP is used for label distribution in L2-VPN Attachement Circuits.
D.MP-BGP is used for label distribution in MPLS Traffic Engineered networks.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Select the statement that best describes The cure for Amplification Principle in the Internetdomain, as explained in RFC 3429 (Internet Architectural Guidelines )()?

A.Amplification is prevented if global changes have only a local effect as opposed to systems in which global changes have a local effect
B.Amplification is prevented if local changes have only a local effect as opposed to system inwhich localchange have a global effect
C.Internet domain does not suffer from“The Amplification Principle”as BGP takes care of misbehaving advertisers
D.None of the above

2.多項選擇題In which of the following BGP-related events is an End-of-RIB (EOR) message sent?()

A.Following a link flap in the BGP speaker’s AS
B.During initial convergence.
C.Following a Route Processor Switchover.
D.Just before sending a CEASE message to tear down the session.
E.During capability negotiation

3.單項選擇題VoIP bearer traffic is typically marked to which DSCP value?()

A.cs3
B.cs7
C.ef
D.af41
E.af31
F.0(default)

4.多項選擇題In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()

A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

5.單項選擇題A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()

A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above

6.多項選擇題Pick the 4 valid ATM Cell Header fields:()

A.GFC-4 bits of generic flow control
B.Forward-explicit congestion notification(FECN)
C.VCI-16 bits of virtual channel identifier
D.CLP-1 bit of congestion loss
E.HEC-8 bit of header error control
F.ATM Discard Eligibility(DE)bit

7.單項選擇題BGP best route selection process is based on what ?()

A.lowest cost
B.highest bandwidth
C.lowest hop-count
D.path attributes
E.lowest delay

8.多項選擇題Which two statements are true about RPF checks in MSDP(Multicast Source Discovery Protocol)?()

A.It prevents message looping,Session Advertisement(SA)messages must be RPF checked
B.RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
C.RPF checking Session Advertisement(SA)messages will cause message looping
D.RPF check should be done against the route to the source S of the corresponding PIM-SM domain

9.單項選擇題The mechanisms for distributing LDP are:()

A.LDP and RSVP
B.RSVP and CEF
C.CEF and the FIB table
D.UDP and IP
E.A and B

10.單項選擇題The show ip ospf database external command displays information about which OSPF LSA type?()

A.LSA type 1
B.LSA type 2
C.LSA type 7
D.LSA type 3
E.LSA type 9
F.LSA type 5

最新試題

Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()

題型:多項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題

Which statement is FALSE concerning Concatenation?()

題型:單項選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()

題型:多項選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:單項選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項選擇題