A.BPDU Guard
B.802.x
C.Port Security
D.Storm Control
您可能感興趣的試卷
你可能感興趣的試題
A.True
B.False
A.Bandwidth that is reserved for SVCs to route over a trunk
B.Bandwidth that is reserved on a trunk so that ABR connections can burst
C.Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections
D.Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic
A.Tag Calling Interface
B.Tag Control Identifier
C.ToS Class Interface
D.Tag Control Information
A.normal
B.discard
C.random
D. full
A.There is a full mesh of pseudowires.
B.There is a partial mesh of pseudowires.
C.Only L2TPv3 can be used for pseudowire establishment.
D.There is split-horizon to avoid loops.
A.Allow a CSS to probe the server
B.Allow a connection to be closed with a TCP RESET
C.Allow persistent connections
D.Allow the use of HTTP HEAD request
A.Addition or Deletion of PVC
B.PVC status (active or inactive)
C.Link integrity
D.None of the other alternatives apply
A.It provides comprehensive Domain Name system
B.It provides DHCP administrative functionality
C.It provides TFTP server functionality.
D.All of the above are true
A.UniDirectional Loop Detection
B.Unspecified Distribution Label Detection
C.Unified Distribution Label Direction
D.UniDirectional Link Detection
A.Microliters installed between a telephone and shared line
B.POTS splitters at the subscriber’s end of the DSL line
C.POTS splitters at the telco CO
D.None of the other alternatives apply
最新試題
Which option describes a benefits of IPv6 VPN Provider Edge?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which statement about the use of Route Target Rewrite is true?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three protocols use TLVs to carry attributes?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
In optical transmission systems, chirped lasers are used for the purpose of:().
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()