多項選擇題Which four of these key points should be considered during implementation of PPPoA architecture?()

A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Where is the MPLS label imposed?()

A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload

2.多項選擇題Which three statements about the BGP next-hop attribute are true? ()

A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.

3.單項選擇題What is the port number of the IPsec Authentication Header packet?()

A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50

4.單項選擇題What does the protocol field inside the PPP frame indicate?()

A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes

5.多項選擇題Which three configuration options are available for configuring the l2tp-class command in L2TPv3?()

A.TCP port
B.authentication
C.IP DF bit
D.retransmit retries
E.sequencing
F.hostname

6.單項選擇題Which BGP attribute can be used to influence inbound traffic flow?()

A.cluster ID
B.Weight
C.MED
D.local preference
E.aggregate

7.多項選擇題What are the two benefits of graceful restart?()

A.Graceful restart allows session information recovery without disruption to the network.
B.A node can perform a graceful restart to help a neighbor recover its state. The label bindings are kepton state information, which helps the failed node recover faster and does notaffect the current for wardtraffic.
C.Graceful restart allows a node to recover state from its neighbor when there is no RP or before thedevice undergoes SSO.
D.Graceful restart does not allow session information recovery.
E.During a graceful restart, the router removes any stale prefixes after a timer for stale entries expires

8.多項選擇題Which three are the ATM cell header fields?()

A.cell loss priority (CLP)
B.discard eligibility (DE)
C.head error control (HEC)
D.generic flow control (GFC)
E.forward explicit congestion notification (FECN)

9.多項選擇題When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()

A.Layer 2 access link QoS design
B.enterprise-to-service-provider mapping models
C.Layer 3 link access QoS design
D.service provider service level agreements
E.Layer 2 link access load balancing

10.單項選擇題Which description of BGP authentication is true?()

A.MD5 has been used by BGP to encrypt BGP update packets.
B.BGP uses a message-digest algorithm to authenticate BGP peers
C.A plain-text password authentication is an option of BGP authentication
D.EBGP peers authentication is faster than IBGP peers authentication
E.BGP uses public key and private key to authenticate BGP peers.

最新試題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項選擇題

MPLS label mapping on an LSR is displayed by which IOS command?()

題型:單項選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:單項選擇題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:單項選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:單項選擇題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:單項選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題