单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.B SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.C SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
单选题
How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
A
SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.
B
SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.
C
SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.
D
SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
参考解析
解析:
暂无解析
相关考题:
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?() A. Traffic is switched from the first node receiving the AIS indication.B. Traffic is switched from the far side of the failure, allowing handshaking to occur.C. UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D. UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.) A. It protects signals against node failures between rings.B. It protects signals against node failure within a single ring.C. It allows for traffic to be preempted when a ring switch occurs.D. Traffic can be dropped and continued at interconnecting nodes.E. It protects preemptible traffic from being dropped when a ring switch occurs.
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?() A. FTP traffic from 192.169.1.22 will be denied.B. No traffic, except for FTP traffic will be allowed to exit E0.C. FTP traffic from 192.169.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.169.1.9/29 will be denied.
How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied
______ is not likely to be a methods of Traffic Separation.A.Separation of opposing streams of traffic by separation zones or linesB.The separation of through traffic from local traffic by provision of inshore traffic zonesC.Division of traffic from several different direction into sectorsD.Control of routing traffic through shipping routes
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、 SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.B、 SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.C、 SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D、 SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
Which of the following is not a characteristic of fast switching?()A、Fast switching reducesa routers CPU utilization, compared to process switchingB、All packets of a flow, except for the first packet, use the information in the fast cacheC、It can be enabled with the interface command ip route-cacheD、Fast switching uses a fast cache maintained in a router’s control planeE、The fast cache contains information about how traffic from different data flows should beforwardedF、Even though the fast switching is enabled, the first packet of a flow is still process switched
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A、All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB、Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC、All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD、All traffic is flooded out all ports and an attacker is able to capture all dataE、None of the other alternatives apply
What are two major differences between MS-SPRing and SNCP?()A、 In an MS-SPRing, all paths are protected.B、 MS-SPRing is always a high-order protection.C、 A low order circuit cannot be protected by an MS-SPRing.D、 There is no theoretical limit in the number of nodes in an SNCP ring.
What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.
Which four services use the inner labels of an MPLS label stack? ()A、MPLS VPNB、switching path in MPLS coreC、Cisco MPLS Traffic Engineering and Fast RerouteD、MPLS over ATME、VPN over Traffic Engineering coreF、any transport over MPLS
How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied
单选题The new traffic rules will become _____ from the first day of 2016.AcomfortableBexcellentCchallengingDeffective
单选题Which of the following is not a characteristic of fast switching?()AFast switching reducesa routers CPU utilization, compared to process switchingBAll packets of a flow, except for the first packet, use the information in the fast cacheCIt can be enabled with the interface command ip route-cacheDFast switching uses a fast cache maintained in a router’s control planeEThe fast cache contains information about how traffic from different data flows should beforwardedFEven though the fast switching is enabled, the first packet of a flow is still process switched
单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
单选题The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()AFTP traffic from 192.169.1.22 will be deniedBNo traffic, except for FTP traffic will be allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied
单选题Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()A Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.B No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.C No. Traffic will loop back and forth between switch S5 and S2.D Yes. Traffic will pass from switch S6 to S3 to S2 to S1.E No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.
多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.
单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply
单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed
单选题() is not likely to be a methods of Traffic Separation.ASeparation of opposing streams of traffic by separation zones or linesBThe separation of through traffic from local traffic by provision of inshore traffic zonesCDivision of traffic from several different direction into sectorsDControl of routing traffic through shipping routes
单选题How will the above access lists affect traffic?()AFTP traffic from 192.169.1.22 will be deniedBNo traffic, except for FTP traffic will be allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied
单选题When the farmers visited the city for the first time, they were _____ by its complicated traffic system.AevokedBbewilderedCdivertedDundermined
单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.B SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.C SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
多选题What are two characteristics of dual-ring interconnect in SDH networks? ()AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.
多选题What are two major differences between MS-SPRing and SNCP?()AIn an MS-SPRing, all paths are protected.BMS-SPRing is always a high-order protection.CA low order circuit cannot be protected by an MS-SPRing.DThere is no theoretical limit in the number of nodes in an SNCP ring.