A. An IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel.
B. The deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a 6to4 tunnel does not require any special code.
C. An IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is used to connect to connect two or more IPv6 domains.
D. For an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a 6to4 tunnel, the ISP assigns only IPv6 addresses for each domain.
您可能感興趣的試卷
你可能感興趣的試題
A.configure a hard-to-guess VTP domain name
B.use a hard-to-guess VTP password
C.use VTP transparent mode
D.implement VTP version 3
A. prefixes received from any other BGP peer and prefixes locally originated via networkstatements or redistributed to BGP
B. all prefixes in its IP routing table
C. only prefixes received from EBGP peers and prefixes locally originated via network statements or redistributed
D. only prefixes received from EBGP peers and prefixes received from route reflectors
E. all prefixes in its routing table except the prefixes received from other EBGP peers
F. all prefixes in its routing table except the prefixes received from other IBGP peers
A.excessive collisions
B.FCS errors
C.runts
D.late collisions
A.interface gig3/1 spanning-tree guard root
B.interface gig3/1 spanning-tree root guard
C.interface gig3/1 spanning-tree root-guard
D.interface gig3/1 spanning-tree root-guard default
A. prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributed
B. all prefixes in its routing table
C. prefixes received from EBGP peers and prefixes locally originated via network statements or redistributed
D. prefixes received from EBGP peers and prefixes received from route reflectors
E. prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes redistributed to BGP
F. prefixes received from other IBGP peers and prefixes received from route reflectors
最新試題
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()
You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()
Which of these statements about penultimate hop popping are true?()
Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()
Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()
Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()
All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()
Which two EIGRP options will limit a query domain?()
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()