A.FEC determines how IP packets are forwarded in MPLS LSP.
B.FEC determines how to establish an LSP path.
C.FEC determines how a group of IP packets are mapped to an LSP.
D.FEC determines how MPLS labels are stacked in LSP.
E.None of above.
您可能感興趣的試卷
你可能感興趣的試題
A.Site-local
B.Link-local
C.Multicast
D.None of the above
A.1
B.2
C.3
D.4
E.5
F.6
A.MPLS TE
B.MPLS VPN
C.When CEF switching and Label switching is done
D.In all the above circumstances
A.Lightweight messaging
B.Memory management
C.Hardware abstraction
D.Host stack
E.Process scheduling
F.All of the above
A.Filter Smurf ICMP packets.
B.Filter as close to the core as possible
C.Filter as close to the edge as possible
D.Filter as precisely as possible
E.Filter both source and destination where possible
A.Two LSAs will exist in the network for this destination, and both will be used
B.Two LSAs will exist in the network for this destination, but only the one generated by the highest RID ASBR will be used
C.Only the LSA generated by the highest RID ASBR will exist in the network
D.Only the LSA generated by the lowest RID ASBR will exist in the network
A.standby 1 priority 110
B.standby 1 priority 120
C.standby 1 priority 130
D.standby 1 priority 110 preempt
E.standby 1 priority 120 preempt
F.standby 1 priority 130 preempt
A.A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor link
B.A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchanged
C.A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor door
D.A SHAM link is part of OSPF network of MPLS-VPN provider
A.AS numbers are assigned by the IANA
B.AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring AS
C.In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the control
D.All of the Above
A.show tag-switching tdp binding 1.1.1.0/24
B.show tag-switching tdp bindings neighbor 1.1.1.0
C.show tag-switching interface e0/0
D.A and B both will show the binding.
E.All of the above.
最新試題
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three protocols use TLVs to carry attributes?()
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
What are three common reasons for ATM CRC errors?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()