A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
您可能感興趣的試卷
你可能感興趣的試題
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
A.5 seconds and 3 retries
B.10 seconds and 5 retries
C.10 seconds and 3 retries
D.20 seconds and 5 retries
E.5 seconds and 5 retries
A.3
B.4
C.5
D.2
E.6
A.SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B.SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
C.Proxy agents were used only in SNMP version 1.
D.SNMP version 3 supports encryption and SNMP version 2 support authentication.
E.GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
A.Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B.MDTs are built in customer networks
C.Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.MDTs are built in provider networks
E.The number of MDTs depends on PIM modes of MDT groups.
最新試題
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which two routers support cable access?()
Which statement is FALSE concerning Concatenation?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()