Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)A、LDP uses Down Stream On Demand.B、RSVP uses Down Stream On Demand.C、LDP uses Down Stream Unsolicited.D、RSVP uses Down Stream Unsolicited.

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)

  • A、LDP uses Down Stream On Demand.
  • B、RSVP uses Down Stream On Demand.
  • C、LDP uses Down Stream Unsolicited.
  • D、RSVP uses Down Stream Unsolicited.

相关考题:

She looked in my face __________. A.with tears streaming down her cheeksB.with tears to stream down her cheeksC.with tears streamed down her cheeksD.with tears to be streamed down her cheeks

Which two statements are true about encrypting RMAN backup?() (Choose two.) A. The transparent encryption of backups uses the encryption walletB. The database uses the same encryption key for every encrypted backupC. The password encryption of backups only uses the password while creating and restoring backupD. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

Which three are true about MPLS LSP establishment using RSVP?() (Choose three.) A. Ordered ControlB. Independent ControlC. Down Stream UnsolicitedD. Liberal Label ManagementE. Down Stream On Demand

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.

Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()A、 Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.B、 Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.C、 Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.D、 Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.E、 ISDN BRIs implement channel-associated signaling.

Which tow statements are most correct regarding opt-in models?()A、A based opt-in model uses virtualized identifiersB、A based opt-in model uses hardware values as identifiersC、A logical server opt-in model uses virtualized identifiersD、A logical server opt-in model uses hardware values as identifiers

Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()A、VPLS uses LDP for signaling.B、VPLS uses BGP for autodiscovery and signaling.C、VPLS uses extended IS-IS for signalingD、VPLS uses OSPF version 3 for auto discovery and signalingE、VPLS uses spanning tree for signaling

Which two statements are true about RSVP and the InServ QoS model?()A、a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocolB、RSVP uses DSCP to signal QoS requirements to routers C、RSVP is a routing protocolD、RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455E、RSVP specifically provides a level of service for rate-sensitive and delay-sensitive trafficF、the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet

Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)A、Ordered ControlB、Independent ControlC、Down Stream UnsolicitedD、Liberal Label ManagementE、Down Stream On Demand

Which statement is true about IP telephony calls?()A、 A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.B、 The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.C、 Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.D、 The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

Which of the following statements is correct regarding a hybridcrypto system?()A、 uses symmetric crypto for keys distributionB、 uses symmetric crypto for proof of originC、 uses symmetric crypto for fast encrypted/decryptionD、 uses asymmetric crypto for message confidentialityE、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

Which of the following statements are true? ()A、 RC4 is a stream cipherB、 Stream ciphers require paddingC、 AES is a block cipherD、 DES and 3DES are stream ciphersE、 AES is a stream cipherF、 AES, DES, and 3DES can be used as HMAC algorithms

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()A、MPLS TE supports admission controlB、MPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathC、MPLS TE uses BGP extension to advertise link attributesD、MPLS TE provides protection capabilityE、MPLS TE uses RSVP to establish LSP

It is important to note that from the core company’s perspective, the supply chain includes (), upstream supplier and down stream customers.A、Internal functionsB、External functionsC、Information systemsD、Physical distribution

Using the Tivoli Dynamic Workload Console, what are two ways to  change the priority of a job?()A、 Open the "Set Priority" panel from the job properties.B、 Change the priority of the job stream that contains the job.C、 Select the corresponding action from the Monitor jobs task panel.D、 Open the job stream properties and drill down to the job priority  panel.E、 The priority of a job can only be changed from the Workload  Designer.

Using Job Scheduling Console, how can the external successor chain  be viewed when a job needs to be canceled?()A、 using the Hyperbolic ViewerB、 opening the Impact view and displaying the successorsC、 opening the Job Stream Instance editor for its Job Stream InstanceD、 opening the Dependencies window and drilling down to the successors

Which two statements regarding symmetric key encryption are true?() (Choose two.)A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption.

Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

单选题Which of the following statements is correct regarding a hybridcrypto system?()A uses symmetric crypto for keys distributionB uses symmetric crypto for proof of originC uses symmetric crypto for fast encrypted/decryptionD uses asymmetric crypto for message confidentialityE uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

多选题Which two statements are true about RSVP and the InServ QoS model?()Aa drawback of implementing RSVP is the requirement to migrate to a supporting routing protocolBRSVP uses DSCP to signal QoS requirements to routersCRSVP is a routing protocolDRSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455ERSVP specifically provides a level of service for rate-sensitive and delay-sensitive trafficFthe flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet

多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

单选题Using Job Scheduling Console, how can the external successor chain  be viewed when a job needs to be canceled?()A using the Hyperbolic ViewerB opening the Impact view and displaying the successorsC opening the Job Stream Instance editor for its Job Stream InstanceD opening the Dependencies window and drilling down to the successors

多选题Which tow statements are most correct regarding opt-in models?()AA based opt-in model uses virtualized identifiersBA based opt-in model uses hardware values as identifiersCA logical server opt-in model uses virtualized identifiersDA logical server opt-in model uses hardware values as identifiers

多选题Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)AOrdered ControlBIndependent ControlCDown Stream UnsolicitedDLiberal Label ManagementEDown Stream On Demand

多选题Which three statements about MPLS traffic engineering (MPLS TE) are true? ()AMPLS TE supports admission controlBMPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathCMPLS TE uses BGP extension to advertise link attributesDMPLS TE provides protection capabilityEMPLS TE uses RSVP to establish LSP

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.

多选题Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()AChannel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.BChannel-associated signaling utilizes a separate TDM channel for transmitting control signals.CCommon channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.DCommon channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.EISDN BRIs implement channel-associated signaling.