A.Great scalability is offered
B.Route Target Rewrite must be configured on ASBRs
C.Multihop EBGP is utilized between route reflectors
D.Multihop EBGP is utilized between ASBRs
E.The ASBRs hold VPNv4 routes
您可能感興趣的試卷
你可能感興趣的試題
A.It requires a next-next hop backup tunnel.
B.Point of local repair (PLR) swaps the next hop label and pushes the backup label.
C.The backup tunnel terminates on the merge point (MP) where traffic rejoins the primary tunnel.
D.The backup tunnel can have associated bandwidth capacity.
E.Restoration time is expected under 50 ms.
A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router
A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.
A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography
A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries
A.3
B.4
C.5
D.2
E.6
A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.
最新試題
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
What is the BGP synchronization rule?()
Which three things are the building blocks of the Cisco VPLS architecture?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which three protocols use TLVs to carry attributes?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
MPLS label mapping on an LSR is displayed by which IOS command?()
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Which two statements about DS-Lite are true?()
Which statement about multicast VPN is true?()