A.Custom Queueing
B.CB-WRED
C.WRR Queueing
D.LLQ
E.CBWFQ
您可能感興趣的試卷
你可能感興趣的試題
A.IP protocol 50
B.IP protocol 51
C.TCP port 50
D.TCP port 51
E.UDP port 50
F.UDP port 51
A.terminating PPP sessions at the service provider
B.PPP framing
C.PPP multiplexing
D.GRE tunneling
E.L2TP tunneling
A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local
A.LSP
B.PSNP
C.ISH
D.CSNP
E.IIH
A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling
A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address
A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
A.The tunnel that is not configured with the policy-class command acts as the default
B.EXP selection is between multiple tunnels to the same destination
C.There is no requirement for IGP extensions
D.Tunnels are configured using the policy-class command and carry multiple EXP values
E.It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
最新試題
Which three protocols use TLVs to carry attributes?()
What are three common reasons for ATM CRC errors?()
MPLS label mapping on an LSR is displayed by which IOS command?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
Which three are advantages of SONET?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().