A.The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hash
B.The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hash
C.Multiple keys are supported
D.Routing updates packets are delivered in encrypted messages
E.Shared secret keys are delivered in encrypted messages
您可能感興趣的試卷
你可能感興趣的試題
A.Prevents head-of-line blocking
B.Uses less memory
C.Increases forwarding performance
D.Simplifies configuration
A.Inserted between the MPLS label stack and the Layer 3 payload
B.Inserted between the MPLS label stack and the Layer 3 Header
C.Inserted between the MPLS label stack and the Layer 2 payload
D.Inserted between the MPLS label stack and the Layer 2 header
A.BGP route-reflector should be in forwarding path of data coming from its clients
B.BGP route-reflector does not have to be in the forwarding path of data coming from its clients
C.BGP route-reflector will stop reflecting the routes if they’re not directly-connected clients
D.None of the above
A.Failure detection
B.Failure reporting
C.IGP LSP/LSA originatio
D.Per-hop flooding time of new link state
E.Number of hops that need to be notified of new link state
A.MPLS LDP must be enabled.
B.BGP routing protocol must be running.
C.Named access-lists must be configured.
D.Symmetrical routing is required.
E.Domain name must be defined
A.Allows incoming TCP connections destined to port 179
B.Allows incoming TCP connections sourced from port 179
C.Allows incoming TCP connections from 1.1.1.1 and destined to,or sourced from port 179
D.Allows incoming TCP connections from 1.1.1.1 that are destined to port 179
E.Allows incoming TCP connections from 1.1.1.1 that are sourced from port 179
A.First (most significant ) octet is FF in hex
B.Starts with a prefix of FE80 to FEBF in hex
C.Starts with a prefix of FECO to FEFF in hex
D.Second octet contains a 4-bit multicast scope field
E.Last 64 bit contains the modified MAC address of the Ethernet interface
F.Is allocated from the unicast address space
A.port tunneling on the Ethernet subinterface
B.VLAN tunneling on the Ethernet trunk
C.port tunneling on the Ethernet interface
D.VLAN tunneling on the Ethernet VLAN subinterface
E.port tunneling on the Ethernet trunk
A.Tunnel label
B.VC-label
C.5-byte ATM header
D.Payload
E.4 byte ATM header
F.Support for 30 packed cells
A.In Anycast RP, two or more RPs are configured with the same IP address on loopback interfaces.
B.Anycast RP provides redundancy and load-sharing capabilities.
C.Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip pim rp-address 1.1.1.1
D.Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip rp-address pim 1.1.1.1
E.Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip anycast-rp pim 1.1.1.1
最新試題
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
In optical transmission systems, chirped lasers are used for the purpose of:().
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
What is the BGP synchronization rule?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
Which three protocols use TLVs to carry attributes?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()