InMulticastVPN(MVPN)implementations,whichtwoofthefollowingstatementsareregardingtheDefaultMDTGroup?() A.ItisusedforPIMcontroltrafficB.Itisoptionallyconfiguredforahighbandwidthmulticastsourcetoreducemulticasttrafficreplication to uninterestedPEroutersC.WithintheVPFconfigurationinthePErouter,multipleDefaultMDTgroupsareconfiguredsoeach VPFcansupportmultiplemulticastsourcesD.ThereisareducedmulticaststateintheMPLScoreProutersE.Whenmulticasttrafficexceedsacertainconfiguredthreshold,trafficfromtheDataMDTisswitched to theDefaultMDTtoconservebandwidth

InMulticastVPN(MVPN)implementations,whichtwoofthefollowingstatementsareregardingtheDefaultMDTGroup?()

A.ItisusedforPIMcontroltraffic

B.Itisoptionallyconfiguredforahighbandwidthmulticastsourcetoreducemulticasttrafficreplication to uninterestedPErouters

C.WithintheVPFconfigurationinthePErouter,multipleDefaultMDTgroupsareconfiguredsoeach VPFcansupportmultiplemulticastsources

D.ThereisareducedmulticaststateintheMPLScoreProuters

E.Whenmulticasttrafficexceedsacertainconfiguredthreshold,trafficfromtheDataMDTisswitched to theDefaultMDTtoconservebandwidth


相关考题:

You need to decide on which trunking method to implement in the Ezonexam network. What is a characteristic of ISL and 802.1q frame. tagging in a switched LAN environment?A.They are used to find the best path through a network.B.They allow the exchange of filtering tables.C.They specify different implementations of the Spanning-Tree Protocol.D.They allow the exchange of routing tablesE.They provide inter-switch VLAN communication.

If possible please suggest further improvement of the String class.Question 3:Given a link list, detect whether it's circular using only one loop.Tips: Below implementation is allowedfor( ... ){...}The following implementations is NOT allowed...for( ... ){...for( ... ) {...}}...or...for( p = list-head, q = list-head; p != NULL q != NULL; p = p-next ){...}...for( ... ){...}

The Internet is based on a connectionless end-to-end packet service, which traditionally provided best-effort means of data ( )using the Transmission Control Protocol/Internet Protocol Suite. Although the ( )design gives the Internet its flexibility and robustness, its packet dynamics also make it prone to congestion problems,especially at ( )that connect networks of widely different bandwidths.The initial QoS function set was for internet hosts.One major problem with expensive wide-area( )links is the excessive overhead due to small Transmission Control Protocol packets created by applications such as telnet and rlogin. The Nagle ( ),which solves this issue,is now supported by all IP host implementations.A.transformationB.transportationC.processingD.progressingA.connectionlessB.connectionC.connection-orientedD.connotationA.hostsB.switchesC.routersD.computersA.interconnectionB.networkC.internetD.webA.technologyB.problemC.structureD.algorithm

Which two routing interface parameters are supported in OSPF implementations?() A. retransmit - intervalB. de ad - intervalC. stub areaD. virtual linkE. NSSA area

Refer to the exhibit. You have completed an OSPF implementation, and you are verifying OSPF operation. You notice that router A and router B are stuck in the two - way state. From the show ip ospf interface command output, what is the cause of this issue?()A. All OSPF implementations must have at le ast one interface in area 0.B. You are attempting to run in the broadcast mode over an NBMA interface.C. Both routers are configured to function as a BDR; therefore, there is no DR router.D. Someone has changed the OSPF router ID; therefore you must clear the OSPF process.E. The OSPF priority is set to 0 on both routers; therefore neither can become the DR.

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()

WhatistheencapsulationformatofanMPLSMulticastVPN(MVPN)packer?() A.IPunicastinIPunicastB.IPmulticastinIPanycastC.IPanycastinIPanycastD.IPmulticastinIPunicastE.IPmulticastinIPmulticastF.IPunicastinIPmulticast

WhenconfiguringMulticastVPN(MVPN)overanMPLScore,boththeDefaultandDataMDTisconfiguredunderwhichconfigurationmode?() A.router(config)#B.router(config-if)#C.router(config-vrf)#D.router(config-router)#E.router(config-router-af)#

Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations. Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()A、IBMeConfigB、IBM Performance MonitorC、IBM Workload Estimator (WLE)D、IBM System Planning Tool (SPT)

What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()A、They are used to find the best path through a network.B、They allow the exchange of filtering tables.C、They specify different implementations of the Spanning-Tree Protocol.D、They allow the exchange of routing tablesE、They provide inter-switch VLAN communication.

When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()A、router(config)#B、router(config-if)#C、router(config-vrf)#D、router(config-router)#E、router(config-router-af)#

Which two statements about the implementation of WLAN QoS are true?()A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

What is an advantage of the IntServ QoS model?()A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.

Which two routing interface parameters are supported in OSPF implementations?()A、retransmit - intervalB、de ad - intervalC、stub areaD、virtual linkE、NSSA area

What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?()A、IP unicast in IP unicastB、IP multicast in IP anycastC、IP anycast in IP anycastD、IP multicast in IP unicastE、IP multicast in IP multicastF、IP unicast in IP multicast

Which of the following BEST describes how server virtualization can cut down IT costs? ()A、 Server virtualization increases server application performance allowing productivity to be increased.B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

单选题Which IOS feature provides dial plan scalability and bandwidth management for H.323 VoIP implementations?()AgatekeeperBCall RoutingCCall Admission ControlDDigital Signal Processors

多选题Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()AVPLS uses LDP for signaling.BVPLS uses BGP for autodiscovery and signaling.CVPLS uses extended IS-IS for signalingDVPLS uses OSPF version 3 for auto discovery and signalingEVPLS uses spanning tree for signaling

单选题When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()Arouter(config)#Brouter(config-if)#Crouter(config-vrf)#Drouter(config-router)#Erouter(config-router-af)#

单选题What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?()AIP unicast in IP unicastBIP multicast in IP anycastCIP anycast in IP anycastDIP multicast in IP unicastEIP multicast in IP multicastFIP unicast in IP multicast

多选题In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()AIt is used for PIM control trafficBIt is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routersCWithin the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sourcesDThere is a reduced multicast state in the MPLS core P routersEWhen multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

多选题Which two routing interface parameters are supported in OSPF implementations?()Aretransmit - intervalBde ad - intervalCstub areaDvirtual linkENSSA area

单选题Multi Protocol Label Switching (MPLS) is a data-carrying mechanism that belongs to the family of packet-switched networks. For an MPLS label, if the stack bit is set to1, which option is true?()AThe stack bit will only be used when LDP is the label distribution protocolBThe label is the last entry in the label stack.CThe stack bit is for Cisco implementations exclusively and will only be used when TDP is the label distribution protocol.DThe stack bit is reserved for future use.

单选题What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()AThey are used to find the best path through a network.BThey allow the exchange of filtering tables.CThey specify different implementations of the Spanning-Tree Protocol.DThey allow the exchange of routing tablesEThey provide inter-switch VLAN communication.