A.Cisco NBAR Discovery
B.Cisco AutoQoS
C.Cisco Class-Based QoS MIB
D.Cisco SDM QoS Wizard
E.CDP
您可能感興趣的試卷
你可能感興趣的試題
A.After the Layer3 header and before Layer2 header
B.After the Layer2 header and before Layer3 header
C.Within the Layer 3 header
D.Before the layer 2 header
A.Site Of Origin SOO.
B.SHAM links with OSPF
C.BGP cost community
D.BGP feature allow-as in
E.RPF Reverse Path forwarding.
F.Access-list Control in Distance Vector protocol like RIP and EIGRP.
A.Sniffing attack
B.Denial of service attack
C.Port Scan attack
D.Reconnaisance attack
E.Spoofing attack
A.If a labeled packet arrives with the top most label of 17, it will be replaced with label 19 and sent out on Ethernet 0/0 interface.
B.If a labeled packet arrives with the top most label of 19, it will be replaced with label 17 and sent out on Ethernet 0/0 interface.
C.If a labeled packet arrives with the top most label of 17, all the labels will be removed and a clear IP Packet is sent to Next Hop 192.168.0.14 on Ethernet 0/0.
D.None of the above.
A.The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )
B.It is an effective way to achieve VLAN transparency between Provider and enterprise customer bytunneling one ser of VLAN tags inside a second VLAN tag
C.The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customer VLAN
D.QinQ is a way to hide native VLAN which can conflict with Provider native VLAN
A.topmost label exp value
B.customer marking
C.Innerrnost label exp value
D.Qos groups/discard class
E.remarked IP tos value
F.MDRR quantam
A.The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane only
B.The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirected
C.The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane only
D.The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.
A.Message Type
B.Calling Number
C.Assigned Session ID
D.Called Number
E.Call Serial Number
A.Extended IS neighbor TLV # 22
B.Extended IS name TLV #137
C.Extended IS resource TLV #138
D.Extended IS reachability TLV #135
E.Router ID TLV # 134
A.A value of 4 represents the "Implicit NULL Label."
B.A value of 0 represents the "IPv4 Explicit NULL Label."
C.A value of 1 represents the "Router Alert Label". The use of this label is analogous to the use of the"Router Alert Option" in IP packets (for example, ping with record route option)
D.A value of 2 represents the "IPv6 Explicit NULL Label"
E.A value of 1 represents the "IPv1 Explicit NULL Label"
F.A value of 3 represents the "Implicit NULL Label"
最新試題
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
What is the BGP synchronization rule?()
Which three protocols use TLVs to carry attributes?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which statement about the use of Route Target Rewrite is true?()
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()