A.A priority of 0 will prevent a router from becoming a DIS.
B.If the DIS becomes unavailable the backup DIS is promoted to DIS.
C.Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.Separate L1 and L2 election processes are held on a brodcast network.
E.L1 routers on a broadcast network only establish adjacencies with the DIS.
F.If there is a tie based on priority,the router whose attached interface has the lowest MAC address becomes the DIS.
您可能感興趣的試卷
你可能感興趣的試題
A.Custom Queueing
B.CB-WRED
C.WRR Queueing
D.LLQ
E.CBWFQ
A.IP protocol 50
B.IP protocol 51
C.TCP port 50
D.TCP port 51
E.UDP port 50
F.UDP port 51
A.terminating PPP sessions at the service provider
B.PPP framing
C.PPP multiplexing
D.GRE tunneling
E.L2TP tunneling
A.multicast temporary node local
B.multicast temporary site local
C.unicast permanent link local
D.multicast permanent node link local
E.multicast permanent site local
F.unicast temporary link local
A.LSP
B.PSNP
C.ISH
D.CSNP
E.IIH
A.EIGRP supports VLSM, route summarization, and routing update authentication.
B.If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C.Passive routes are in the process of being calculated by DUAL.
D.EIGRP exchanges full routing table information with neighboring routers with every update.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
A.VPLS uses LDP for signaling.
B.VPLS uses BGP for autodiscovery and signaling.
C.VPLS uses extended IS-IS for signaling
D.VPLS uses OSPF version 3 for auto discovery and signaling
E.VPLS uses spanning tree for signaling
A.highest router ID first, then highest priority
B.highest MAC address first, then highest priority
C.highest router ID first, then highest MAC address
D.highest priority first, then highest router ID
E.highest priority first, then highest MAC address
A.Route tagging is one of the techniques used by RTBH
B.It is used for BGP authentication
C.It cannot work with static routes
D.It uses extended ACLs for blocking attacks by creating a black hole
E.Before configuring RTBH LDP must be enabled on the interface
A.path monitoring
B.tandem connection monitoring activation deactivation (TCM ACT)
C.Payload Structure Identifier (PSI)
D.multiframe alignment signal (MFAS)
E.section monitoring
最新試題
Which two routers support cable access?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which statement is FALSE concerning Concatenation?()
Which statement about multicast VPN is true?()
Which statement about the use of Route Target Rewrite is true?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()