單項選擇題Select the statement that best describes The cure for Amplification Principle in the Internetdomain, as explained in RFC 3429 (Internet Architectural Guidelines )()?

A.Amplification is prevented if global changes have only a local effect as opposed to systems in which global changes have a local effect
B.Amplification is prevented if local changes have only a local effect as opposed to system inwhich localchange have a global effect
C.Internet domain does not suffer from“The Amplification Principle”as BGP takes care of misbehaving advertisers
D.None of the above


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題In which of the following BGP-related events is an End-of-RIB (EOR) message sent?()

A.Following a link flap in the BGP speaker’s AS
B.During initial convergence.
C.Following a Route Processor Switchover.
D.Just before sending a CEASE message to tear down the session.
E.During capability negotiation

2.單項選擇題VoIP bearer traffic is typically marked to which DSCP value?()

A.cs3
B.cs7
C.ef
D.af41
E.af31
F.0(default)

3.多項選擇題In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()

A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

4.單項選擇題A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()

A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above

5.多項選擇題Pick the 4 valid ATM Cell Header fields:()

A.GFC-4 bits of generic flow control
B.Forward-explicit congestion notification(FECN)
C.VCI-16 bits of virtual channel identifier
D.CLP-1 bit of congestion loss
E.HEC-8 bit of header error control
F.ATM Discard Eligibility(DE)bit

最新試題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項選擇題

How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()

題型:單項選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

Which two statements about DS-Lite are true?()

題型:多項選擇題

Which three are advantages of SONET?()

題型:多項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()

題型:單項選擇題

What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()

題型:單項選擇題