单选题Based on the need to limit processing and bandwidth utilization due to dynamic routing protocol operation, the foll owing routing requirements have been specified for your network. - partial and incremental routing updates - only the devices affected by a topology change perform route recomputation - route recomputation only occurs for routes that were affected Which dynamic routing protocol should be deployed in your network to best meet these requirements?()ABGPBOSPFCIS - ISDEIGRPERIPv2

单选题
Based on the need to limit processing and bandwidth utilization due to dynamic routing protocol operation, the foll owing routing requirements have been specified for your network. - partial and incremental routing updates - only the devices affected by a topology change perform route recomputation - route recomputation only occurs for routes that were affected Which dynamic routing protocol should be deployed in your network to best meet these requirements?()
A

BGP

B

OSPF

C

IS - IS

D

EIGRP

E

RIPv2


参考解析

解析: 暂无解析

相关考题:

DOM is a platform. and language-(66)AP1 that allows programs and scripts to dynamically access and update the content, structure and style. of WWW documents(currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented(67). DOM is a(68)-based API to documents, which requires the whole document to be represented in(69)while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large(70)documents that do not fit into the memory available for processing.A.specificB.neutralC.containedD.related

What are two characteristics of the RED algorithm as implemented in JUNOS software?() A. It profiles based on bandwidth.B. It profiles based on loss priority.C. It prevents traffic loss through buffering.D. It prevents global synchronization with tail drops.

DOM is a platform. and language -(66)API that allows programs and scripts to dynamically access and update the content, structure and style. of WWW documents(currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented(67)DOM is a(68)-based API to documents, which requires the whole document to be represented in(69)while processing it. A simpler alternative to DOM is the event - based SAX, which can be used to process very large(70)documents that do not fit into the memory available for processing.A.specificB.neutralC.containedD.related

Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

What are the two primary advantages of content networking solutions? () A.Optimized processing of error notificationB.Optimized processing of bandwidth requestsC.Optimized processing of content deliveryD.Optimized processing of content requests

Based on the need to limit processing and bandwidth utilization due to dynamic routing protocol operation, the foll owing routing requirements have been specified for your network.- partial and incremental routing updates-only the devices affected by a topology change perform route recomputation- route recomputation only occurs for routes that were affectedWhich dynamic routing protocol should be deployed in your network to best meet these requirements?()A. BGPB. OSPFC. IS - ISD. EIGRPE. RIPv2

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?() A. Bandwidth 56000B. Bandwidth 56000000C. Bandwidth 56D. Bandwidth 56kbps

To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used?()A、class-based weighted fair queuing (CBWFQ)B、low latency queuing (LLQ)C、priority queuing (PQ) or custom queuing (CQ)D、Real-Time Transport Protocol (RTP) header compressionE、TCP header compressionF、UDP header compression

What are two steps to define a QoS policy?()A、set a minimum bandwidth guaranteeB、increase bandwidthC、determine a specific transfer rateD、establish timersE、configure CBWFQ for best-effort trafficF、set a maximum bandwidth limit

What happens when you enable QoS bandwidth detection? ()(Choose two.)A、Circuit speed is reduced by 2% for overhead.B、WAN speed can be configured to the LAN speed.C、Bandwidth is adjusted based on minimum and maximum settingsD、WAN bandwidth is detected based on acknowledgement of metapackets.

What are two characteristics of the RED algorithm as implemented in JUNOS software?()A、It profiles based on bandwidth.B、It profiles based on loss priority.C、It prevents traffic loss through buffering.D、It prevents global synchronization with tail drops.

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps

Spanning Tree Protocol calculates path cost based on which of these? ()A、 interface bandwidthB、 interface delayC、 interface bandwidth and delayD、 hop countE、 bridge priority

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C、Use class-based policing to limit the peer-to-peer traffic rate.D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

Why is an STM-1 2F-MS-SPRing NOT feasible?()A、 An equal amount of working and protect bandwidth is required.B、 DCC bandwidth is not large enough to handle K1/K2 processing.C、 Switch times would exceed 50 ms for an STM-1 MS-SPRing ring.D、 There is not enough bandwidth in an STM-1 ring to justify MS-SPRing protection.

You are building a Front Controller using a JSP page and you need to determine if the user’s session hasNOT been created yet and perform some special processing for this case. Which scriptlet code snippet willperform this test?()A、% if ( request.getSession(false) == null ) {// special processing} %B、% if ( request.getHttpSession(false) == null ) {// special processing} %C、% if ( requestObject.getSession(false) == null ) { // special processing} %D、% if ( requestObject.getHttpSession(false) == null ) { // special processing} %

What happens when you enable QoS bandwidth detection? ()(Choose two.)A、Circuit speed is reduced by 2% for overhead.B、WAN speed can be configured to the LAN speed.C、Bandwidth is adjusted based on minimum and maximum settings.D、WAN bandwidth is detected based on acknowledgement of metapackets.

our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket

多选题What happens when you enable QoS bandwidth detection? ()(Choose two.)ACircuit speed is reduced by 2% for overhead.BWAN speed can be configured to the LAN speed.CBandwidth is adjusted based on minimum and maximum settingsDWAN bandwidth is detected based on acknowledgement of metapackets.

多选题What happens when you enable QoS bandwidth detection? ()(Choose two.)ACircuit speed is reduced by 2% for overhead.BWAN speed can be configured to the LAN speed.CBandwidth is adjusted based on minimum and maximum settings.DWAN bandwidth is detected based on acknowledgement of metapackets.

多选题To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used?()Aclass-based weighted fair queuing (CBWFQ)Blow latency queuing (LLQ)Cpriority queuing (PQ) or custom queuing (CQ)DReal-Time Transport Protocol (RTP) header compressionETCP header compressionFUDP header compression

单选题Why is an STM-1 2F-MS-SPRing NOT feasible?()A An equal amount of working and protect bandwidth is required.B DCC bandwidth is not large enough to handle K1/K2 processing.C Switch times would exceed 50 ms for an STM-1 MS-SPRing ring.D There is not enough bandwidth in an STM-1 ring to justify MS-SPRing protection.

多选题What are the two primary advantages of content networking solutions? ()AOptimized processing of error notificationBOptimized processing of bandwidth requestsCOptimized processing of content deliveryDOptimized processing of content requests

多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.

多选题What are two steps to define a QoS policy?()Aset a minimum bandwidth guaranteeBincrease bandwidthCdetermine a specific transfer rateDestablish timersEconfigure CBWFQ for best-effort trafficFset a maximum bandwidth limit

单选题Spanning Tree Protocol calculates path cost based on which of these?()Ainterface bandwidthBinterface delayCinterface bandwidth and delayDhop countEbridge priority