A.It is generated by an ASBR and indicates the reachability to an ABR located in another area.
B.It is generated by ABR and indicates the reachability to an ASBR located in another AS.
C.It is generated by ABR and indicates reachability to itself.
D.It is generated by ABR and indicates the reachability to an ASBR located in another area.
E.It is generated by ASBR and indicates the reachability to an ABR.
您可能感興趣的試卷
你可能感興趣的試題
A.Class-based Model
B.Maximum Allocation Model
C.Russian Doll Model
D.Global Tunnel Model
E.Policy-based Model
A.AFI is 2, SAFI is 128
B.AFI is 1, SAFI is 64
C.AFI is 2, SAFI is 64
D.AFI is 1, SAFI is 96
E.AFI is 2, SAFI is 96
F.AFI is 1, SAFI is 128
A.asynchronous response mode (ARM)
B.normal peer mode (NPM)
C.asynchronous balanced mode (ABM)
D.normal response mode (NRM)
E.asynchronous client mode (ACM)
A.OSPF
B.BGP
C.RIP version 2
D.IS-IS
E.EIGRP
A.Local mechanism is at the middle-point router.
B.EXP selection is between multiple tunnels to the same destination
C.Bundle members are configured with EXP values to carry.
D.The tunnel selection is configured on the tunnel master.
E.The tunnel master bundles the tunnel members
A.LDP hello packets are sent to TCP 646.
B.LDP session packets are sent to TCP 646.
C.LDP session packets are sent to TCP 711.
D.LDP hello packets are sent to TCP 711.
E.LDP hello packets are sent to UDP 711.
F.LDP hello packets are sent to UDP 646.
A.The logical router can span across chassis.
B.The fabric and system controller module are shared by all logical routers.
C.Each logical router has a distinct fabric and system controller module
D.The logical router can share a route processor
E.The logical router cannot share a route processor
A.The VPNv4 address is 128 bits long with a 128-bit long subnet mask
B.The VPNv4 address consists of an RD and an IPv4 address
C.The VPNv4 address is 96 bits long with a 64-bit long subnet mask
D.The VPNv4 address is 128 bits long with a 64-bit long subnet mask
E.The VPNv4 address consists of an RT and an IPv4 address
F.The VPNv4 address is 96 bits long with a 32-bit long subnet mask
A.MSDP is running between anycast RPs
B.Anycast RP provides redundancy and load-sharing capabilities
C.Multicast BGP is running between anycast RPs
D.In anycast RP,two or more RPs are configured with the same multicast IP address on loopback interfaces
E.In anycast RP,two or more RPs are configured with the same unicast IP address on loopback interfaces
A.The bgp deterministic-med command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path length
B.The bgp always-compare command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path system
C.Enabling the bgp deterministic-med command ensures the comparison of the MED variable when choosing routes advertised by different peers in the same autonomous system.
D.Enabling the bgp always-compare-med command ensures the comparison of the MED variable for paths from neighbors in different autonomous systems.
E.The bgp deterministic-med and bgp always-compare-med commands are enabled by defult.
最新試題
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
What is the BGP synchronization rule?()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Which two statements about Layer 3 MPLS VPN are true?()
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Which statement is FALSE concerning Concatenation?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()