网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements about MPLS point-to-multipoint traffic engineering (P2MP TE) are true? ()
A

P2MP TE uses an OSPF extension that is different from the OSPF extension that is used in P2P TE

B

Loose path is not supported in P2MP TE

C

Multiple IP multicast groups can map to one P2MP tunnel

D

Affinity is not supported in P2MP TE

E

P2MP TE uses Constrained Shortest Path First (CSPF) to calculate paths


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements about MPLS point-to-multipoint traffic engineering (P2MP TE) are true? ()AP2MP TE uses an OSPF extension that is different from the OSPF extension that is used in P2P TEBLoose path is not supported in P2MP TECMultiple IP multicast groups can map to one P2MP tunnelDAffinity is not supported in P2MP TEEP2MP TE uses Constrained Shortest Path First (CSPF) to calculate paths” 相关考题
考题 Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

考题 Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。A、It establishes a static route to the 172.16.3.0 networkB、It establishes a static route to the 192.168.2.0 networkC、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 networkD、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4E、It uses the default administrative distanceF、It is a route that would be used last if other routes to the same destination exist

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which three statements about NetFlow are true?()A、NetFlow records unidirectional IP traffic flow.B、NetFlow records MPLS frame flow.C、NetFlow expert is only over TCP.D、NetFlow records is only over UDP.E、NetFlow records subinterface information of traffic flow.

考题 Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)A、It is necessary to forward ARP requests to remote hosts.B、It is necessary when translated traffic belongs to the same subnet as the ingress interface.C、It is not automatic and you must configure it.D、It is enabled by default and you do not need to configure it.

考题 Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

考题 Which two routing protocols support MPLS traffic engineering link information distribution? ()A、OSPFB、BGPC、RIP version 2D、IS-ISE、EIGRP

考题 Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A、The tunnel that is not configured with the policy-class command acts as the defaultB、EXP selection is between multiple tunnels to the same destinationC、There is no requirement for IGP extensionsD、Tunnels are configured using the policy-class command and carry multiple EXP valuesE、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

考题 Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.

考题 Which three statements about MPLS traffic engineering (MPLS TE) are true? ()A、MPLS TE supports admission controlB、MPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathC、MPLS TE uses BGP extension to advertise link attributesD、MPLS TE provides protection capabilityE、MPLS TE uses RSVP to establish LSP

考题 Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

考题 多选题Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。AIt establishes a static route to the 172.16.3.0 networkBIt establishes a static route to the 192.168.2.0 networkCIt configures the router to send any traffic for an unknown destination to the 172.16.3.0 networkDIt configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4EIt uses the default administrative distanceFIt is a route that would be used last if other routes to the same destination exist

考题 多选题Which three statements about MPLS traffic engineering (MPLS TE) are true? ()AMPLS TE supports admission controlBMPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathCMPLS TE uses BGP extension to advertise link attributesDMPLS TE provides protection capabilityEMPLS TE uses RSVP to establish LSP

考题 单选题Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A The tunnel that is not configured with the policy-class command acts as the defaultB EXP selection is between multiple tunnels to the same destinationC There is no requirement for IGP extensionsD Tunnels are configured using the policy-class command and carry multiple EXP valuesE It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

考题 多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

考题 多选题Which two statements about MPLS label-switched paths (LSPs) are true? ()ALSPs are bidirectional.BLSPs are unidirectional.CLSPs must follow the IGP's shortest path.DLSPs can follow paths other than the IGP's shortest path.

考题 多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.

考题 多选题Which two routing protocols support MPLS traffic engineering link information distribution? ()AOSPFBBGPCRIP version 2DIS-ISEEIGRP

考题 多选题Which three statements about NetFlow are true?()ANetFlow records unidirectional IP traffic flow.BNetFlow records MPLS frame flow.CNetFlow expert is only over TCP.DNetFlow records is only over UDP.ENetFlow records subinterface information of traffic flow.

考题 多选题Which two statements about MPLS point-to-multipoint traffic engineering (P2MP TE) are true? ()AP2MP TE uses an OSPF extension that is different from the OSPF extension that is used in P2P TEBLoose path is not supported in P2MP TECMultiple IP multicast groups can map to one P2MP tunnelDAffinity is not supported in P2MP TEEP2MP TE uses Constrained Shortest Path First (CSPF) to calculate paths

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

考题 多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.

考题 多选题Which two Any Transport over MPLS (AToM) traffic encapsulations require the use of a control word?()AHDLCBATM AAL5CPPPDEthernet VLANEFrame Relay