多項(xiàng)選擇題Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()

A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?()

A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address

2.單項(xiàng)選擇題Which statement about Remotely Triggered Black Hole (RTBH) is true?()

A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface

3.單項(xiàng)選擇題What is one of the primary overhead fields associated with the Optical Payload Unit (OPU)?()

A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring

4.單項(xiàng)選擇題Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()

A.The tunnel that is not configured with the policy-class command acts as the default
B.EXP selection is between multiple tunnels to the same destination
C.There is no requirement for IGP extensions
D.Tunnels are configured using the policy-class command and carry multiple EXP values
E.It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

5.單項(xiàng)選擇題What is the label for MPLS over ATM?()

A.VPI 16
B.DLCI
C.VPI and VCI
D.circuit number
E.PVC and SVC

最新試題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:?jiǎn)雾?xiàng)選擇題

Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()

題型:多項(xiàng)選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:?jiǎn)雾?xiàng)選擇題

What is the BGP synchronization rule?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

題型:多項(xiàng)選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項(xiàng)選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:?jiǎn)雾?xiàng)選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項(xiàng)選擇題

Which two statements about Layer 3 MPLS VPN are true?()

題型:多項(xiàng)選擇題