單項(xiàng)選擇題Select the statement that best describes The cure for Amplification Principle in the Internetdomain, as explained in RFC 3429 (Internet Architectural Guidelines )()?

A.Amplification is prevented if global changes have only a local effect as opposed to systems in which global changes have a local effect
B.Amplification is prevented if local changes have only a local effect as opposed to system inwhich localchange have a global effect
C.Internet domain does not suffer from“The Amplification Principle”as BGP takes care of misbehaving advertisers
D.None of the above


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題In which of the following BGP-related events is an End-of-RIB (EOR) message sent?()

A.Following a link flap in the BGP speaker’s AS
B.During initial convergence.
C.Following a Route Processor Switchover.
D.Just before sending a CEASE message to tear down the session.
E.During capability negotiation

2.單項(xiàng)選擇題VoIP bearer traffic is typically marked to which DSCP value?()

A.cs3
B.cs7
C.ef
D.af41
E.af31
F.0(default)

3.多項(xiàng)選擇題In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()

A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

4.單項(xiàng)選擇題A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()

A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above

5.多項(xiàng)選擇題Pick the 4 valid ATM Cell Header fields:()

A.GFC-4 bits of generic flow control
B.Forward-explicit congestion notification(FECN)
C.VCI-16 bits of virtual channel identifier
D.CLP-1 bit of congestion loss
E.HEC-8 bit of header error control
F.ATM Discard Eligibility(DE)bit

最新試題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項(xiàng)選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:?jiǎn)雾?xiàng)選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項(xiàng)選擇題

Which three are advantages of SONET?()

題型:多項(xiàng)選擇題

Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

題型:多項(xiàng)選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項(xiàng)選擇題

Which statement is FALSE concerning Concatenation?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:?jiǎn)雾?xiàng)選擇題