A.It requires a next-next hop backup tunnel.
B.Point of local repair (PLR) swaps the next hop label and pushes the backup label.
C.The backup tunnel terminates on the merge point (MP) where traffic rejoins the primary tunnel.
D.The backup tunnel can have associated bandwidth capacity.
E.Restoration time is expected under 50 ms.
您可能感興趣的試卷
你可能感興趣的試題
A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router
A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.
A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography
A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries
A.3
B.4
C.5
D.2
E.6
A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.
A.AAL2
B.AAL 4
C.AL 5
D.AAL 1
E.AAL 3
最新試題
Which statement is FALSE concerning Concatenation?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
MPLS label mapping on an LSR is displayed by which IOS command?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()