單項(xiàng)選擇題What best describes the usage of Route-Target rewrite?()

A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()

A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics

2.單項(xiàng)選擇題What OSPF LSA is used to support MPLS-traffic Engineering ?()

A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )

3.多項(xiàng)選擇題Select the two answers that best describe the IP Event Dampening feature()

A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers

4.單項(xiàng)選擇題What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potentialexit point out of the area ?()

A.ATT(Attached)bit
B.IS-Type bits
C.P(Partition)bit
D.Down bit
E.PN(Pseudonode)biy
F.ABR(Area Border Rorter)bit

5.單項(xiàng)選擇題What is jitter?()

A.The total end-to-end delay
B.The variations of delay.
C.The delay caused by placing the bits on the wire.
D.The time it takes for the bits to transit the physical media.

6.多項(xiàng)選擇題Which two statements regarding the IS-IS DIS election process are true? ()

A.A priority of 0 will prevent a router from becoming a DIS.
B.If the DIS becomes unavailable the backup DIS is promoted to DIS.
C.Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.Separate L1 and L2 election processes are held on a brodcast network.
E.L1 routers on a broadcast network only establish adjacencies with the DIS.
F.If there is a tie based on priority,the router whose attached interface has the lowest MAC address becomes the DIS.

8.單項(xiàng)選擇題What is the port number of an IPsec Encapsulating Security Payload packet?()

A.IP protocol 50
B.IP protocol 51
C.TCP port 50
D.TCP port 51
E.UDP port 50
F.UDP port 51

9.多項(xiàng)選擇題In PPPoA architecture, which two methods are most commonly deployed?()

A.terminating PPP sessions at the service provider
B.PPP framing
C.PPP multiplexing
D.GRE tunneling
E.L2TP tunneling

10.單項(xiàng)選擇題What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?()

A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local

最新試題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:?jiǎn)雾?xiàng)選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:?jiǎn)雾?xiàng)選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:?jiǎn)雾?xiàng)選擇題

Which statement about VPLS is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about multicast VPN is true?()

題型:?jiǎn)雾?xiàng)選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:?jiǎn)雾?xiàng)選擇題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項(xiàng)選擇題

Which three are advantages of SONET?()

題型:多項(xiàng)選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:?jiǎn)雾?xiàng)選擇題

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

題型:多項(xiàng)選擇題