A.Level-1(L1) routers use default routes announced by Level-2(L2) routers in Level-1(L1) domain
B.Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcements from Level-1-2(L1/L2) router
C.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-1-2(L1/L2) by route-leaking feature of Cisco IOS
D.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-2(L2) by route-leaking feature of Cisco IOS
您可能感興趣的試卷
你可能感興趣的試題
A.By default,Netflow records bidirectional IP traffic flow.
B.Netflow answers questions regarding IP traffic:who,what,where,when,and how
C.Netflow accounts for both transit traffic and traffic destined for the router.
D.Netflow returns the subinterface information in the flow records.
A.PW capabilities list
B.Message type
C.Assigned control connection ID
D.PW type
E.Remote session ID
F.Hostname
A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.
A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics
A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )
最新試題
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which two routers support cable access?()
MPLS label mapping on an LSR is displayed by which IOS command?()
Which statement about the use of Route Target Rewrite is true?()
Which three protocols use TLVs to carry attributes?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
In optical transmission systems, chirped lasers are used for the purpose of:().
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()