A.Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B.Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C.MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D.OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E.The control plane is responsible for forwarding packets.
F.The two major components of MPLS include the control plane and the data plane.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.
Which command needs to be applied to the SOHO77 to complete the configuration?()
A.encapsulation aal5snap applied to the PVC
B.encapsulation aal5ciscoppp applied to the PVC
C.encapsulation aal5ciscoppp applied to the ATM0 interface
D.encapsulation aal5mux ppp dialer applied to the ATM0 interface
E.encapsulation aal5mux ppp dialer applied to the PVC
A.Inoculate systems by applying update patches.
B.Limit traffic rate.
C.Apply authentication.
D.Quarantine infected machines.
E.Enable anti-spoof measures.
A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected.
A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process
A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures
最新試題
Which two statements about an IDS are true?()
Which form of DSL technology is typically used as a replacement for T1 lines?()
What is a reason for implementing MPLS in a network?()
If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()
Which two statements about the Cisco AutoSecure feature are true?()
Which three categories of signatures can a Cisco IPS microengine identify?()
Which three statements about IOS Firewall configurations are true?()
Which statement is true about a worm attack?()
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
Refer to the exhibit. What type of security solution will be provided for the inside network?()