多項選擇題Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM
B.BiDirPIM
C.PIM-SMRP
D.RP-Switchover
E.SourceSpecificMulticast


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the default value of the SPT threshold in Cisco routers?()

A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity

2.單項選擇題To which of these does IP multicast send packets?()

A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously

3.單項選擇題Which of these ports does syslog use to send messages to a syslog server?()

A.TCP502
B.TCP514
C.TCP520
D.UDP502
E.UDP514
F.UDP520

4.單項選擇題Which of these is a benefit of ESM?()

A. supports multiple MIBs
B. includesNetFlow, NBAR, and IP SLA software subsystems
C. includesNetFlow, syslog, and IP SLA software subsystems
D. includes a predefined framework for filtering and correlating messages
E. supports two logging processes so output can be sent in standard and ESM format

5.單項選擇題How does ERS use the VLAN tag?()

A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

6.單項選擇題Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()

A. use BGP as the CE-PE routing protocol
B. use OSPF as the CE-PE routing protocol
C. use EIGRP as the CE-PE routing protocol
D. use the SP to redistribute routes as external routes for OSPF and EIGRP
E. use route redistribution at each location to ensure external routes are imported into the IGP

7.多項選擇題Which two of these are characteristics of MPLS VPNs?()

A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPLS label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

9.多項選擇題Which two of these are characteristics of Metro Ethernet? ()

A. class of service
B. bandwidth profiles
C. user-network interface
D. Ethernet LAN circuit attributes
E. Ethernet virtual circuit attributes

10.多項選擇題Which two of these Metro Internet services map to E-LAN services that are defined by the MEF?()

A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service

最新試題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項選擇題

Which three of these are important when determining NAS Server scaling? ()

題型:多項選擇題

Which of the following is the primary consideration to scale VPNs?()

題型:單項選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項選擇題