多項(xiàng)選擇題Select two valid administratively scoped multicast addresses in networks running Interior Gatewayprotocols like EIGRP and OSPF?()

A.239.0.0.1
B.239.255.255.255
C.224.0.0.10
D.224.0.0.5


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which statements are correct for forwarding traffic into MPLS TE tunnels?()

A.Autoroute causes the tunnel to be treated as a directly connected link to the head-end.
B.Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel.
C.Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP.
D.Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.

2.單項(xiàng)選擇題Which of the following statements is correct regarding PIM Sparse Mode operations?()

A.It does not support all underlying unicast routing protocols like GBP
B.It supports shared trees only assuming all hosts want the multicast traffic
C.Receivers are registered with RP by their first-hop router
D.Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)
E.From the RP,traffic flows down a Source Tree to each receiver

3.單項(xiàng)選擇題In the context of GMPLS,LMP stands for().

A.Loop Management Protocol
B.Label Management Protocol
C.Load Management Protocol
D.Link Management Protocol
E.None of above

4.單項(xiàng)選擇題Which of the following IOS commands cause syslog messages to be stamped with time and dates?()

A.service timestamps log datetime
B.logging trap datetime
C.service logging datetime
D.logging datetime on
E.logging timestamps on

5.單項(xiàng)選擇題How would you characterize the source and type in a denial of service attack on a router?()

A.By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B.By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C.By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D.By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

最新試題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about multicast VPN is true?()

題型:?jiǎn)雾?xiàng)選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:?jiǎn)雾?xiàng)選擇題

Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()

題型:多項(xiàng)選擇題

Which statement is FALSE concerning Concatenation?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()

題型:?jiǎn)雾?xiàng)選擇題

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()

題型:多項(xiàng)選擇題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about 10 Gigabit Ethernet (10GE) are true?()

題型:多項(xiàng)選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:?jiǎn)雾?xiàng)選擇題