單項選擇題In which of the following lists of APS Action Requests is the priority correctly arranged from lowest tohighest?()

A.Wait-to-Restore,F(xiàn)orced Switch,Manual Switch,Lockout of Protection
B.Manual Switch,Wait-to-Restore,Lockout of Protection,F(xiàn)orced Switch
C.Lockout of Protection,F(xiàn)orced Switch, Manual Switch,Wait-to-Restore
D.Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore
E.Wait-to-Restore,Manual Switch,F(xiàn)orced Switch,Lockout of Protection
F.Wait-to-Restore,Manual Switch,Lockout of Protection,F(xiàn)orced Switch


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題Which statements are correct for forwarding traffic into MPLS TE tunnels?()

A.Autoroute causes the tunnel to be treated as a directly connected link to the head-end.
B.Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel.
C.Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP.
D.Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.

3.單項選擇題Which of the following statements is correct regarding PIM Sparse Mode operations?()

A.It does not support all underlying unicast routing protocols like GBP
B.It supports shared trees only assuming all hosts want the multicast traffic
C.Receivers are registered with RP by their first-hop router
D.Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)
E.From the RP,traffic flows down a Source Tree to each receiver

4.單項選擇題In the context of GMPLS,LMP stands for().

A.Loop Management Protocol
B.Label Management Protocol
C.Load Management Protocol
D.Link Management Protocol
E.None of above

5.單項選擇題Which of the following IOS commands cause syslog messages to be stamped with time and dates?()

A.service timestamps log datetime
B.logging trap datetime
C.service logging datetime
D.logging datetime on
E.logging timestamps on

6.單項選擇題How would you characterize the source and type in a denial of service attack on a router?()

A.By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B.By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C.By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D.By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

7.多項選擇題Which statements about MPLS Label Distribution Protocol(LDP) are valid?()

A.LDP hello packets are sent to UDP port 646
B.LDP hello packets are sent to TCP port 711
C.LDP sessions are TCP sessions to port 646
D.LDP sessions are TCP sessions to port 711
E.LDP establishes a peer relationship with another router that must be directly attached
F.LDP can establishes a peer relationship with another router that is not directly attached

8.多項選擇題Which two statemets are true?()

A.DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B.DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C.In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D.DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.

9.多項選擇題Which two statements are correct with regard to route distinguisher as defined in RFC 4364-AKA IP-VPN(MPLS-VPN)?()

A.The configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1
B.A route distinguisher can be imported and exported to and from a VRF
C.Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.
D.Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.

10.多項選擇題Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()

A.Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.
B.Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.
C.Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.
D.Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.
E.Control Plane Policing (CoPP) protects the transit management and data traffic through the router.

最新試題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題

Which statement about VPLS is true?()

題型:單項選擇題

What are three common reasons for ATM CRC errors?()

題型:多項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項選擇題

Which two statements about Layer 3 MPLS VPN are true?()

題型:多項選擇題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:單項選擇題