A.It requires a next-next hop backup tunnel.
B.Point of local repair (PLR) swaps the next hop label and pushes the backup label.
C.The backup tunnel terminates on the merge point (MP) where traffic rejoins the primary tunnel.
D.The backup tunnel can have associated bandwidth capacity.
E.Restoration time is expected under 50 ms.
您可能感興趣的試卷
你可能感興趣的試題
A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router
A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.
A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography
A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries
A.3
B.4
C.5
D.2
E.6
A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.
A.AAL2
B.AAL 4
C.AL 5
D.AAL 1
E.AAL 3
最新試題
Which statement about the use of Route Target Rewrite is true?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which statement is FALSE concerning Concatenation?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
What is the BGP synchronization rule?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()