單項選擇題Which option describes the incorrect usage of the Label Distribution method?()

A.LDP is primarily used in internal networks of MPLS-VPN providers.
B.MP-BGP is used for label distribution for VPN customer routes.
C.Directed LDP is used for label distribution in L2-VPN Attachement Circuits.
D.MP-BGP is used for label distribution in MPLS Traffic Engineered networks.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Select the statement that best describes The cure for Amplification Principle in the Internetdomain, as explained in RFC 3429 (Internet Architectural Guidelines )()?

A.Amplification is prevented if global changes have only a local effect as opposed to systems in which global changes have a local effect
B.Amplification is prevented if local changes have only a local effect as opposed to system inwhich localchange have a global effect
C.Internet domain does not suffer from“The Amplification Principle”as BGP takes care of misbehaving advertisers
D.None of the above

2.多項選擇題In which of the following BGP-related events is an End-of-RIB (EOR) message sent?()

A.Following a link flap in the BGP speaker’s AS
B.During initial convergence.
C.Following a Route Processor Switchover.
D.Just before sending a CEASE message to tear down the session.
E.During capability negotiation

3.單項選擇題VoIP bearer traffic is typically marked to which DSCP value?()

A.cs3
B.cs7
C.ef
D.af41
E.af31
F.0(default)

4.多項選擇題In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()

A.It is used for PIM control traffic
B.It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C.Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D.There is a reduced multicast state in the MPLS core P routers
E.When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

5.單項選擇題A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()

A.Logging detect fail-login
B.Login on-failure log
C.Login detect login-failure log
D.Logging login on-failure
E.none of the above

最新試題

Which statement about VPLS is true?()

題型:單項選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:單項選擇題

Which two statements about DS-Lite are true?()

題型:多項選擇題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:單項選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題

When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()

題型:單項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

Which three protocols use TLVs to carry attributes?()

題型:多項選擇題

What are three common reasons for ATM CRC errors?()

題型:多項選擇題

MPLS label mapping on an LSR is displayed by which IOS command?()

題型:單項選擇題