A.normal
B.discard
C.random
D. full
您可能感兴趣的试卷
你可能感兴趣的试题
A.There is a full mesh of pseudowires.
B.There is a partial mesh of pseudowires.
C.Only L2TPv3 can be used for pseudowire establishment.
D.There is split-horizon to avoid loops.
A.Allow a CSS to probe the server
B.Allow a connection to be closed with a TCP RESET
C.Allow persistent connections
D.Allow the use of HTTP HEAD request
A.Addition or Deletion of PVC
B.PVC status (active or inactive)
C.Link integrity
D.None of the other alternatives apply
A.It provides comprehensive Domain Name system
B.It provides DHCP administrative functionality
C.It provides TFTP server functionality.
D.All of the above are true
A.UniDirectional Loop Detection
B.Unspecified Distribution Label Detection
C.Unified Distribution Label Direction
D.UniDirectional Link Detection
A.Microliters installed between a telephone and shared line
B.POTS splitters at the subscriber’s end of the DSL line
C.POTS splitters at the telco CO
D.None of the other alternatives apply
A.AAU2
B.AAL3
C.AAL4
D.AAL5
A.Service Ethertype
B.ISL
C.PseudoLAN TAG
D.802.1q VLAN TAG
E.Control Word
F.Tunnel Label
A.A neighbor that has met the feasibility condition
B.A neighbor that has met the feasibility condition and has the lowest cost path towards the destination
C.Any neighbor that is in the path towards the destination.
D.Any neighbor that is in the path towards the destination and whose reported distance equals thefeasible distance
A.LSA type 1
B.LSA type 2
C.LSA type 3
D.LSA type 4
E.LSA type 5
F.LSA type 6
最新试题
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple trafficclasses including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which two statements about Layer 3 MPLS VPN are true?()
Which three protocols use TLVs to carry attributes?()
Which three things are the building blocks of the Cisco VPLS architecture?()