A.Routing information received through an IBGP session is not forwarded to another IBGP neighbor, onlyto EBGP neighbors
B.Routing information received through an EBGP session is not forwarded to another EBGP neighbor,only to IBGP neighbors
C.BGP neighbor peerings are established and sychronized using the TCP 3-way handshake
D.BGP shall not advertise a route until that route has been learned via an IGP also
您可能感興趣的試卷
你可能感興趣的試題
A.10 Gigabit Ethernet does not support VLAN definition
B.10 Gigabit Ethernet supports full duplex links, but does not support half duplex links
C.10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections
D.10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
E.10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported
A.IGP and RSVP
B.EBGPv4 with a sending community
C.IGP and EBGPv4
D.IGP and LDP
E.EBGPv4 with a sending label
A.hub and spoke
B.PE
C.CE
D.hub
E.spoke
A.privilege-level configuration
B.fabric cards
C.SNMP traps
D.admin- level configuration
E.exec- level configuration
A.All CE devices emulate a bridge
B.All provider devices emulate a bridge
C.Hierarchical VPLS reduces signaling overhead
D.Each PE device emulates a bridge
E.Each CE device emulates a bridge
最新試題
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which two statements about Layer 3 MPLS VPN are true?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which two statements about DS-Lite are true?()
In optical transmission systems, chirped lasers are used for the purpose of:().
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()