多項選擇題Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ:()

A.Message Type
B.Calling Number
C.Assigned Session ID
D.Called Number
E.Call Serial Number


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What ISIS TLVs are used to support MPLS-traffic Engineering?()

A.Extended IS neighbor TLV # 22
B.Extended IS name TLV #137
C.Extended IS resource TLV #138
D.Extended IS reachability TLV #135
E.Router ID TLV # 134

2.多項選擇題Which 4 statements regarding MPLS Label Stack Encoding is true?()

A.A value of 4 represents the "Implicit NULL Label."
B.A value of 0 represents the "IPv4 Explicit NULL Label."
C.A value of 1 represents the "Router Alert Label". The use of this label is analogous to the use of the"Router Alert Option" in IP packets (for example, ping with record route option)
D.A value of 2 represents the "IPv6 Explicit NULL Label"
E.A value of 1 represents the "IPv1 Explicit NULL Label"
F.A value of 3 represents the "Implicit NULL Label"

3.多項選擇題RIPv2 differs from RIPv1 in that:()

A.it uses multicast address 224.0.0.10,instead of broadcast
B.it uses multicast address 224.0.0.9,instead of broadcast
C.it can use either multicast or broadcast addresses,instead of just broadcast
D.it sends incremental updates,instead of periodic updates
E.it is classless,instead of classful
F.it supports authentication,and RIPv1 does not

4.單項選擇題What is the requirement of Remote Triggered Black Hole (RTBH ) filtering?()

A.IBGP updates exchange between trigger router and black hole router
B.EBGP updates exchange between trigger router and black hole router
C.OSPF updates exchange between trigger router and black hole router
D.ISIS updates exchange between trigger router and black hole router

5.多項選擇題Which of the following statements about MD5 Routing Updates authentication is valid? ()

A.The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hash
B.The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hash
C.Multiple keys are supported
D.Routing updates packets are delivered in encrypted messages
E.Shared secret keys are delivered in encrypted messages

最新試題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題

Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()

題型:單項選擇題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項選擇題

Which two statements about DS-Lite are true?()

題型:多項選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:單項選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題