多項選擇題Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? ()

A.PW capabilities list
B.Message type
C.Assigned control connection ID
D.PW type
E.Remote session ID
F.Hostname


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What best describes the usage of Route-Target rewrite?()

A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.

2.多項選擇題Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()

A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics

3.單項選擇題What OSPF LSA is used to support MPLS-traffic Engineering ?()

A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )

4.多項選擇題Select the two answers that best describe the IP Event Dampening feature()

A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers

5.單項選擇題What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potentialexit point out of the area ?()

A.ATT(Attached)bit
B.IS-Type bits
C.P(Partition)bit
D.Down bit
E.PN(Pseudonode)biy
F.ABR(Area Border Rorter)bit

最新試題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:單項選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:單項選擇題

Which two routers support cable access?()

題型:多項選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:單項選擇題

Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()

題型:單項選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:單項選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項選擇題

Which two statements about 10 Gigabit Ethernet (10GE) are true?()

題型:多項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項選擇題