A.LSP
B.PSNP
C.ISH
D.CSNP
E.IIH
您可能感興趣的試卷
你可能感興趣的試題
A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling
A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address
A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
最新試題
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
In optical transmission systems, chirped lasers are used for the purpose of:().
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which two statements about DS-Lite are true?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three protocols use TLVs to carry attributes?()
Which two routers support cable access?()
What is the BGP synchronization rule?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()