單項(xiàng)選擇題What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?()

A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題Which two statements about EIGRP are true?()

A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

3.多項(xiàng)選擇題Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()

A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling

4.單項(xiàng)選擇題In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?()

A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address

5.單項(xiàng)選擇題Which statement about Remotely Triggered Black Hole (RTBH) is true?()

A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface

最新試題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項(xiàng)選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:單項(xiàng)選擇題

Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()

題型:多項(xiàng)選擇題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:單項(xiàng)選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項(xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:單項(xiàng)選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項(xiàng)選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項(xiàng)選擇題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:單項(xiàng)選擇題