A.BPDU Guard
B.802.x
C.Port Security
D.Storm Control
您可能感興趣的試卷
你可能感興趣的試題
A.True
B.False
A.Bandwidth that is reserved for SVCs to route over a trunk
B.Bandwidth that is reserved on a trunk so that ABR connections can burst
C.Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections
D.Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic
A.Tag Calling Interface
B.Tag Control Identifier
C.ToS Class Interface
D.Tag Control Information
A.normal
B.discard
C.random
D. full
A.There is a full mesh of pseudowires.
B.There is a partial mesh of pseudowires.
C.Only L2TPv3 can be used for pseudowire establishment.
D.There is split-horizon to avoid loops.
最新試題
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which statement about the use of Route Target Rewrite is true?()
Which statement is FALSE concerning Concatenation?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
What is the BGP synchronization rule?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()