單項選擇題Where are MPLS point-to-multipoint traffic engineering packets replicated?()

A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three statements about BGP confederation and route reflectors are true? ()

A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.

2.多項選擇題Which two statements about NTP version 4 are true?()

A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography

3.多項選擇題Process-level redundancy is implemented by a system manager process that creates the standby process.What two functions are provided by the system-level process called Qnet Symlink Manager (QSM)?()

A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information

5.單項選擇題What are the default values for GRE tunnel keeplive time and number of retries?()

A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries

7.單項選擇題Which statement about SNMP is true?()

A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.

8.多項選擇題In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups aretrue? ()

A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.

9.單項選擇題Which type of AAL does ATM utilize to deliver CBR traffic?()

A.AAL2
B.AAL 4
C.AL 5
D.AAL 1
E.AAL 3

10.多項選擇題Which two models are the models of DiffServ-Aware Traffic Engineering? ()

A.Policy-based Model
B.Class based Model
C.Russian Doll Model
D.Global Tunnel Model
E.Maximum Allocation Model

最新試題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項選擇題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:單項選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:單項選擇題

Which information is carried in the OSPFv3 intra-area Prefix LSA?()

題型:單項選擇題

What are three common reasons for ATM CRC errors?()

題型:多項選擇題

Which statement is FALSE concerning Concatenation?()

題型:單項選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題