A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth
您可能感興趣的試卷
你可能感興趣的試題
A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above
A.GFC-4 bits of generic flow control
B.Forward-explicit congestion notification(FECN)
C.VCI-16 bits of virtual channel identifier
D.CLP-1 bit of congestion loss
E.HEC-8 bit of header error control
F.ATM Discard Eligibility(DE)bit
A.lowest cost
B.highest bandwidth
C.lowest hop-count
D.path attributes
E.lowest delay
A.It prevents message looping,Session Advertisement(SA)messages must be RPF checked
B.RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
C.RPF checking Session Advertisement(SA)messages will cause message looping
D.RPF check should be done against the route to the source S of the corresponding PIM-SM domain
A.LDP and RSVP
B.RSVP and CEF
C.CEF and the FIB table
D.UDP and IP
E.A and B
A.LSA type 1
B.LSA type 2
C.LSA type 7
D.LSA type 3
E.LSA type 9
F.LSA type 5
A.Packet mode
B.Frame mode
C.Transparent mode
D.Channel mode
E.Tunnel mode
A.It removes the top label in the MPLS label stack.
B.It adds a top label in MPLS label stack.
C.It replaces the top label in the MPLS label stack with another value.
D.It replaces the top label in the MPLS label stack with a set of labels.
E.None of above.
A.Wait-to-Restore,Forced Switch,Manual Switch,Lockout of Protection
B.Manual Switch,Wait-to-Restore,Lockout of Protection,Forced Switch
C.Lockout of Protection,Forced Switch, Manual Switch,Wait-to-Restore
D.Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore
E.Wait-to-Restore,Manual Switch,Forced Switch,Lockout of Protection
F.Wait-to-Restore,Manual Switch,Lockout of Protection,Forced Switch
A.239.0.0.1
B.239.255.255.255
C.224.0.0.10
D.224.0.0.5
最新試題
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which three are advantages of SONET?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
What are three common reasons for ATM CRC errors?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
Which statement about the use of Route Target Rewrite is true?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()