In BGP MPLS VPNs, which router maintains VPN-specific routing tables, also known as VRFs?() A.PB.CEC.PED.SP

In BGP MPLS VPNs, which router maintains VPN-specific routing tables, also known as VRFs?()

A.P

B.CE

C.PE

D.SP


相关考题:

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an(71)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(72). Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages(73)As administrators seek to block dangerous email attachments through the recognition of well-known(74), virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still nm and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(75)access to your network.A.attachmentB.packetC.datagramD.message

如果路由器配置了BGP协议,要把网络地址133.1.2.0/24发布给邻居,那么发布这个公告的命令是(51)。A.R1(config-router)#network 133.1.2.0B.R1(config-router)#network 133.1.2.0 0.0.0.255C.R1(config-router)#network-advertise 133.1.2.0D.R1(config-router)#network 133.1.2.0 mask 255.255.255.0

路由器Router2的各接口已启用MPLS协议进程。在路由器Router2特权模式下分别输入以下3条命令:①show mpls ldp neighbor②show mpls ldp discovery⑧show mpls ldp bindings请解释以上3条配置命令各自完成什么功能?

Whichofthefollowingconceptsisdescribedasmultiple(多重)logical(逻辑)subnets(子网)traversingthesamephysicalnetwork(物理网络)?() A.DHCPB.VLANsC.DMZD.VPNs

Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an(66)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(67).Upon running, such worms usually proceed to send themselves out to email addresses from the victim' s address book ,previous emails, web pages(68).As administrators seek to block dangerous email attachments through the recognition of well- known (69), virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to . bat and . cnd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(70)access to your network.A.attachmentB.paeketC.datagramD.message

ThenetworksetupforthistroubleticketisshowninFigure3.TroubleTicketStatementDSW1andR4cannotpingR2’sloopbackorR2’ss0/0/0/0.12IPv6address.InitialtroubleshootingshowsandR2isnotanOSPFv3neighboronR3.ConfigurationonR2ipv6unicast-routing!ipv6routerospf6router-id2.2.2.2!interfaces0/0/0/0.23ipv6address2026::1:1/122ConfigurationR3ipv6unicast-routing!ipv6routerospf6router-id3.3.3.3!interfaces0/0/0/0.23ipv6address2026::1:2/122ipv6ospf6area0Figure3OnWhichdeviceisthefaultconditionlocated?()

在所有BGP路由器使能Router-refresh能力的情况下,如果BGP的入门路由策略发生了变化,本地BGP路由器会想对等体发布Router-refresh消息,收到此消息的对等体会将其路由信息重新发给本地BGP路由器 A.错误B.正确

如果路由器system视图下和BGP视图下都配置了router-id,由于BGP的视图优先级更高,则BGP使用BGP视图下的router-id A.错误B.正确

MPLS-VPN网络中,以下哪些元素是M-BGP分配或者传递的()。 A.公网路由B.私网路由C.公网标签D.私网标签

【单选题】IP RAN采用的协议()A.MPLSB.MPLS-TPC.LDPD.OSPF与BGP