多項(xiàng)選擇題Which four of these key points should be considered during implementation of PPPoA architecture?()

A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Where is the MPLS label imposed?()

A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload

2.多項(xiàng)選擇題Which three statements about the BGP next-hop attribute are true? ()

A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.

3.單項(xiàng)選擇題What is the port number of the IPsec Authentication Header packet?()

A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50

4.單項(xiàng)選擇題What does the protocol field inside the PPP frame indicate?()

A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes

5.多項(xiàng)選擇題Which three configuration options are available for configuring the l2tp-class command in L2TPv3?()

A.TCP port
B.authentication
C.IP DF bit
D.retransmit retries
E.sequencing
F.hostname

最新試題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項(xiàng)選擇題

Which two routers support cable access?()

題型:多項(xiàng)選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:?jiǎn)雾?xiàng)選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:?jiǎn)雾?xiàng)選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:?jiǎn)雾?xiàng)選擇題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about VPLS is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項(xiàng)選擇題

Which statement about multicast VPN is true?()

題型:?jiǎn)雾?xiàng)選擇題