单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()Aan LSP for each local CE deviceBan LSP for each remote PE deviceCan LSP for each remote CE deviceDan LSP for each CE facing interface

单选题
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()
A

an LSP for each local CE device

B

an LSP for each remote PE device

C

an LSP for each remote CE device

D

an LSP for each CE facing interface


参考解析

解析: 暂无解析

相关考题:

关于MPLSBGPVPN(不跨域)标签的说法正确的有()A.VPN报文转发采用两层标签方式B.第一层(外层)标签在骨干网内部进行交换,指示从PE到对端PE的一条LSP,VPN报文利用这层标签,可以沿LSP到达对端PEC.第二层(内层)标签在从对端PE到达CE时使用,指示报文应被送到哪个Site,或者到达哪一个CE。对端PE根据内层标签可以找到转发报文的接口D.内层标签由LDP协议分发给LSR

There are three routers on a Gigabit Ethernet LAN: Router A, Router B, and Router C. Router A is the Designated Intermediate System (DIS) at Level 1 for that LAN. Router A‘s DIS priority is 64. The LAN is a Level 1-only link. Router D has just been powered up on that same LAN and its DIS priority is 80.Which statement is true?()A. Router A remains the DIS and generates a new pseudonode LSP for that LANB. Router A remains the DIS and NO new pseudonode LSP is generated for that LANC. Router D becomes the new DIS, generates a new pseudonode LSP for that LAN, and purges the old pseudonode LSP generated by Router AD. Router D becomes the new DIS, does NOT generate a new pseudonode LSP for that LAN, and does NOT purge the old pseudonode LSP generated by Router A

What does the LSP Holdtime field in an IS-IS database indicate?() A. the LSP ageB. the LSP refresh intervalC. the LSP elapsed lifetimeD. the LSP remaining lifetime

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?() A. an LSP for each local CE deviceB. an LSP for each remote PE deviceC. an LSP for each remote CE deviceD. an LSP for each CE facing interface

以下关于MP说法正确的是()。A、MP是Detour LSP或Bypass LSP的头节点B、MP是Detour LSP或Bypass LSP的尾节点C、MP必须在主LSP路径上D、MP可以是主LSP的头节点

在IS-IS协议中()用于识别一个LSP的新旧。A、LSP序列号B、LSP剩余生存时间C、LSP IDD、LSP的Source ID

What is the role of Forwarding Equivalence Class (FEC) in MPLS?()A、FEC determines how IP packets are forwarded in MPLS LSP.B、FEC determines how to establish an LSP path.C、FEC determines how a group of IP packets are mapped to an LSP.D、FEC determines how MPLS labels are stacked in LSP.E、None of above.

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface

Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface

What does the LSP Holdtime field in an IS-IS database indicate?()A、the LSP ageB、the LSP refresh intervalC、the LSP elapsed lifetimeD、the LSP remaining lifetime

Which condition must be met to allow a PE router to forward VPN traffic across a LSP in a Layer 3 VPN environment?()A、The BGP next hop must be in inet.1.B、The BGP next hop must be in inet.3.C、Must have a bidirectional LSP configured.D、Must have a static route to allow an RP for connected interfaces.

Bypass LSP不能同时是主LSP,LSP不能被嵌套保护。

Two Label-Switched Paths called LSP A and LSP B have been configured on a router. LSP A has been configured with a hold-priority of 3. There is insufficient reservable bandwidth along the path to accomodate both LSPs reservation requirements. Which setup priority must LSP B have to pre-empt LSP A and use its bandwidth?()A、2B、3C、4D、7

There are three routers on a Gigabit Ethernet LAN: Router A, Router B, and Router C. Router A is the Designated Intermediate System (DIS) at Level 1 for that LAN. Router A's DIS priority is 64. The LAN is a Level 1-only link. Router D has just been powered up on that same LAN and its DIS priority is 80. Which statement is true?()A、Router A remains the DIS and generates a new pseudonode LSP for that LANB、Router A remains the DIS and NO new pseudonode LSP is generated for that LANC、Router D becomes the new DIS, generates a new pseudonode LSP for that LAN, and purges the old pseudonode LSP generated by Router AD、Router D becomes the new DIS, does NOT generate a new pseudonode LSP for that LAN, and does NOT purge the old pseudonode LSP generated by Router A

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional.   Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices.  A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet.   You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices.   Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office.   What should you do? ()A、 Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.B、 Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.C、 Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.D、 Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()Aan LSP for each local CE deviceBan LSP for each remote PE deviceCan LSP for each remote CE deviceDan LSP for each CE facing interface

单选题What is the role of Forwarding Equivalence Class (FEC) in MPLS?()AFEC determines how IP packets are forwarded in MPLS LSP.BFEC determines how to establish an LSP path.CFEC determines how a group of IP packets are mapped to an LSP.DFEC determines how MPLS labels are stacked in LSP.ENone of above.

单选题Two Label-Switched Paths called LSP A and LSP B have been configured on a router. LSP A has been configured with a hold-priority of 3. There is insufficient reservable bandwidth along the path to accomodate both LSPs reservation requirements. Which setup priority must LSP B have to pre-empt LSP A and use its bandwidth?()A2B3C4D7

填空题MPLS VPN业务数据采用两层标签栈的封装结构,其中()标签代表了从PE到对端PE的一条LSP,()标签指示了PE所连接的站点或者CE。

单选题There are three routers on a Gigabit Ethernet LAN: Router A, Router B, and Router C. Router A is the Designated Intermediate System (DIS) at Level 1 for that LAN. Router A's DIS priority is 64. The LAN is a Level 1-only link. Router D has just been powered up on that same LAN and its DIS priority is 80. Which statement is true?()ARouter A remains the DIS and generates a new pseudonode LSP for that LANBRouter A remains the DIS and NO new pseudonode LSP is generated for that LANCRouter D becomes the new DIS, generates a new pseudonode LSP for that LAN, and purges the old pseudonode LSP generated by Router ADRouter D becomes the new DIS, does NOT generate a new pseudonode LSP for that LAN, and does NOT purge the old pseudonode LSP generated by Router A

单选题You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional.   Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices.  A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet.   You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices.   Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office.   What should you do? ()A Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.B Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.C Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.D Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.

单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()Aan LSP for each local CE deviceBan LSP for each remote PE deviceCan LSP for each remote CE deviceDan LSP for each CE facing interface

单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()AConfigure each server running Routing and Remote Access as a RADIUS Client.  BAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  CAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  DAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题Which condition must be met to allow a PE router to forward VPN traffic across a LSP in a Layer 3 VPN environment?()AThe BGP next hop must be in inet.1.BThe BGP next hop must be in inet.3.CMust have a bidirectional LSP configured.DMust have a static route to allow an RP for connected interfaces.

单选题What does the LSP Holdtime field in an IS-IS database indicate?()Athe LSP ageBthe LSP refresh intervalCthe LSP elapsed lifetimeDthe LSP remaining lifetime