A.IBGP updates exchange between trigger router and black hole router
B.EBGP updates exchange between trigger router and black hole router
C.OSPF updates exchange between trigger router and black hole router
D.ISIS updates exchange between trigger router and black hole router
您可能感興趣的試卷
你可能感興趣的試題
A.The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hash
B.The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hash
C.Multiple keys are supported
D.Routing updates packets are delivered in encrypted messages
E.Shared secret keys are delivered in encrypted messages
A.Prevents head-of-line blocking
B.Uses less memory
C.Increases forwarding performance
D.Simplifies configuration
A.Inserted between the MPLS label stack and the Layer 3 payload
B.Inserted between the MPLS label stack and the Layer 3 Header
C.Inserted between the MPLS label stack and the Layer 2 payload
D.Inserted between the MPLS label stack and the Layer 2 header
A.BGP route-reflector should be in forwarding path of data coming from its clients
B.BGP route-reflector does not have to be in the forwarding path of data coming from its clients
C.BGP route-reflector will stop reflecting the routes if they’re not directly-connected clients
D.None of the above
A.Failure detection
B.Failure reporting
C.IGP LSP/LSA originatio
D.Per-hop flooding time of new link state
E.Number of hops that need to be notified of new link state
A.MPLS LDP must be enabled.
B.BGP routing protocol must be running.
C.Named access-lists must be configured.
D.Symmetrical routing is required.
E.Domain name must be defined
A.Allows incoming TCP connections destined to port 179
B.Allows incoming TCP connections sourced from port 179
C.Allows incoming TCP connections from 1.1.1.1 and destined to,or sourced from port 179
D.Allows incoming TCP connections from 1.1.1.1 that are destined to port 179
E.Allows incoming TCP connections from 1.1.1.1 that are sourced from port 179
A.First (most significant ) octet is FF in hex
B.Starts with a prefix of FE80 to FEBF in hex
C.Starts with a prefix of FECO to FEFF in hex
D.Second octet contains a 4-bit multicast scope field
E.Last 64 bit contains the modified MAC address of the Ethernet interface
F.Is allocated from the unicast address space
A.port tunneling on the Ethernet subinterface
B.VLAN tunneling on the Ethernet trunk
C.port tunneling on the Ethernet interface
D.VLAN tunneling on the Ethernet VLAN subinterface
E.port tunneling on the Ethernet trunk
A.Tunnel label
B.VC-label
C.5-byte ATM header
D.Payload
E.4 byte ATM header
F.Support for 30 packed cells
最新試題
In optical transmission systems, chirped lasers are used for the purpose of:().
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which two statements about DS-Lite are true?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()
Which two statements about Layer 3 MPLS VPN are true?()
Which two routers support cable access?()