多項選擇題Which three protocols use TLVs to carry attributes?()

A.Cisco Discovery Protocol
B.Label Discovery Protocol
C.Border Gateway Protocol
D.OSPF
E.RIP version 2


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題What are three common reasons for ATM CRC errors?()

A.Incorrect VPI and VCI configuration
B.Noise, gain hits, or other transmission problems on the data link equipment
C.ATM cells are dropped due to incorrect ATM routing in the service provider.
D.A faulty or failing ATM interface.
E.Cells are dropped due to traffic policing in the ATM cloud on one or more virtual circuits attached to theATM interface

4.多項選擇題Which three things are the building blocks of the Cisco VPLS architecture?()

A.VLAN Trunk Protocol (VTP)
B.State Synchronization Protocol (SSP)
C.L2VPN
D.Ethernet Virtual Switch Interface (VSI)
E.Label Distribution Protocol (LDP)

6.多項選擇題Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()

A.multipart-to-multipoint EVC (E-LAN)
B.hub spoke EVC (E-Tree)
C.point to point EVC (E-Line)
D.rooted multipoint EVC (E-Tree)
E.point-to-multipoint EVC (E-Tree)

7.多項選擇題Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

A.MPLS TE supports admission control
B.MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path
C.MPLS TE uses BGP extension to advertise link attributes
D.MPLS TE provides protection capability
E.MPLS TE uses RSVP to establish LSP

8.多項選擇題Which three are advantages of SONET?()

A.Allows the transportation of all forms of traffic
B.Multiplexing is easy
C.Clocks do not need to be synchronized
D.Reduces network complexity and cost
E.Padding is not necessary and not permitted

9.單項選擇題Which statement about the use of Route Target Rewrite is true?()

A.It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations
B.It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations
C.It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration in Route Target assignment for VPN configurations
D.It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration of the Route Target assignment for VPN configurations
E.It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the PE router to avoid to misconfiguration of the Route Target assignment for VPN configurations

10.單項選擇題What is the BGP synchronization rule?()

A.Routing information received through an IBGP session is not forwarded to another IBGP neighbor, onlyto EBGP neighbors
B.Routing information received through an EBGP session is not forwarded to another EBGP neighbor,only to IBGP neighbors
C.BGP neighbor peerings are established and sychronized using the TCP 3-way handshake
D.BGP shall not advertise a route until that route has been learned via an IGP also

最新試題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項選擇題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:單項選擇題

Which two routers support cable access?()

題型:多項選擇題

Which statement about multicast VPN is true?()

題型:單項選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:單項選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:單項選擇題