网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
A
Traffic is switched from the first node receiving the AIS indication.
B
Traffic is switched from the far side of the failure, allowing handshaking to occur.
C
UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.
D
UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
参考答案
参考解析
解析:
暂无解析
更多 “单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A Traffic is switched from the first node receiving the AIS indication.B Traffic is switched from the far side of the failure, allowing handshaking to occur.C UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.” 相关考题
考题
Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries
考题
UPSR protection switching is initiated by (), while BLSR is initiated by ().
A. the K1 SONET byte; the K2 SONET byteB. the K2 SONET byte;the K1 SONET byteC. transmitter switching;receiver detectionD. Line Overhead bytes;Path Overhead bytesE. Path Overhead bytes;Line Overhead bytes
考题
A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()
A. VT circuitsB. STS circuitsC. VT tunnel circuitsD. 1:1 protection circuitsE. 1:N protection circuits
考题
You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?()
A.0B.1C.2D.3E.4
考题
What is the correct relative switching priority in a BLSR ring (higher to lower)?()
A. signal fail, signal degrade, manual switchB. signal degrade, signal fail, manual switchC. protection lockout, manual switch, path AISD. forced switch, manual switch, signal degradeE. protection lockout, manual switch, forced switch
考题
Why is an OC-3 2F-BLSR not feasible?()
A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.
考题
Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings
考题
How will the above access lists affect traffic?()
A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied
考题
A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()A、VT circuitsB、STS circuitsC、VT tunnel circuitsD、1:1 protection circuitsE、1:N protection circuits
考题
In the network, VLAN Trunking Protocol (VTP) is running with a domain name of R1. VLANs 1, 2,3, 4, 5, 10, 20 are active on the network. Suddenly the whole network goes down. No traffic isbeing passed on VLANs 2, 3, 4, 5, 10, 20. However, traffic passes on VLAN 1 and indicates allswitches are operational. Right before the network problem occurred; a switch named SW13 wastaken out of the lab and added to the network. What three configuration issues on SW13 could becausing the network outage?()A、SW13 has a higher VTP configuration revision than the current VTP revisionB、SW13 is configured as a VTP server with a different domain nameC、SW13 is configured as a VTP server with the domain name R1D、SW13 has a lower VTP configuration revision than the current VTP revisionE、SW13 is not configured to participate in VTPF、SW13 is configured with only VLAN1
考题
What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch
考题
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、Traffic is switched from the first node receiving the AIS indication.B、Traffic is switched from the far side of the failure, allowing handshaking to occur.C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
考题
UPSR protection switching is initiated by (), while BLSR is initiated by ().A、the K1 SONET byte; the K2 SONET byteB、the K2 SONET byte;the K1 SONET byteC、transmitter switching;receiver detectionD、Line Overhead bytes;Path Overhead bytesE、Path Overhead bytes;Line Overhead bytes
考题
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing
考题
A subscriber makes a two-minute call and a four-minute call during the busy hour. How much traffic does he generate for that hour? ()A、33 millierlangsB、66 millierlangsC、100 millierlangsD、10 millierlangsE、25millierlangs
考题
Which four services use the inner labels of an MPLS label stack? ()A、MPLS VPNB、switching path in MPLS coreC、Cisco MPLS Traffic Engineering and Fast RerouteD、MPLS over ATME、VPN over Traffic Engineering coreF、any transport over MPLS
考题
How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied
考题
单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A
SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.B
SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.C
SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D
SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
考题
单选题A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()A
VT circuitsB
STS circuitsC
VT tunnel circuitsD
1:1 protection circuitsE
1:N protection circuits
考题
单选题Why is an OC-3 2F-BLSR not feasible?()A
Switch times would exceed 50 ms for an OC-3 BLSR ring.B
An equal amount of working and protect bandwidth is required.C
DCC bandwidth is not large enough to handle K1/K2 processing.D
There is not enough bandwidth in an OC-3 ring to justify BLSR protection.
考题
单选题Which statement is correct regarding exception traffic processing?()A
Exception traffic is only handled by the PFEB
Exception traffic is rate-limited across the internal link to protect the REC
Exception traffic is not prioritized during times of congestionD
Exception traffic is forwarded based on forwarding table entries
考题
单选题UPSR protection switching is initiated by (), while BLSR is initiated by ().A
the K1 SONET byte; the K2 SONET byteB
the K2 SONET byte;the K1 SONET byteC
transmitter switching;receiver detectionD
Line Overhead bytes;Path Overhead bytesE
Path Overhead bytes;Line Overhead bytes
考题
单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A
All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB
Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC
All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD
All traffic is flooded out all ports and an attacker is able to capture all dataE
None of the other alternatives apply
考题
单选题What protection method is used in 4F BLSR networks?()A
Each fiber has half of its SONET capacity reserved for protection.B
Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.C
The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D
The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
热门标签
最新试卷