A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router
您可能感興趣的試卷
你可能感興趣的試題
A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.
A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography
A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries
A.3
B.4
C.5
D.2
E.6
A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.
A.AAL2
B.AAL 4
C.AL 5
D.AAL 1
E.AAL 3
A.Policy-based Model
B.Class based Model
C.Russian Doll Model
D.Global Tunnel Model
E.Maximum Allocation Model
最新試題
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which option describes a benefits of IPv6 VPN Provider Edge?()
What are three common reasons for ATM CRC errors?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which two statements about DS-Lite are true?()