网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()

A. Traffic is switched from the first node receiving the AIS indication.

B. Traffic is switched from the far side of the failure, allowing handshaking to occur.

C. UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.

D. UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.


参考答案

更多 “ How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?() A. Traffic is switched from the first node receiving the AIS indication.B. Traffic is switched from the far side of the failure, allowing handshaking to occur.C. UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D. UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring. ” 相关考题
考题 UPSR protection switching is initiated by (), while BLSR is initiated by (). A. the K1 SONET byte; the K2 SONET byteB. the K2 SONET byte;the K1 SONET byteC. transmitter switching;receiver detectionD. Line Overhead bytes;Path Overhead bytesE. Path Overhead bytes;Line Overhead bytes

考题 What is the correct relative switching priority in a BLSR ring (higher to lower)?() A. signal fail, signal degrade, manual switchB. signal degrade, signal fail, manual switchC. protection lockout, manual switch, path AISD. forced switch, manual switch, signal degradeE. protection lockout, manual switch, forced switch

考题 Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

考题 What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.) A. It protects signals against node failures between rings.B. It protects signals against node failure within a single ring.C. It allows for traffic to be preempted when a ring switch occurs.D. Traffic can be dropped and continued at interconnecting nodes.E. It protects preemptible traffic from being dropped when a ring switch occurs.

考题 Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings

考题 What is the purpose of the limit switch on gravity davits?A.To cut off the power when the davits hit the track safety stopsB.To stop the davits from going too fastC.To cut off the power when the davits are about 12 inches or more from the track safety stopsD.None of the above

考题 What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch

考题 How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、Traffic is switched from the first node receiving the AIS indication.B、Traffic is switched from the far side of the failure, allowing handshaking to occur.C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 UPSR protection switching is initiated by (), while BLSR is initiated by ().A、the K1 SONET byte; the K2 SONET byteB、the K2 SONET byte;the K1 SONET byteC、transmitter switching;receiver detectionD、Line Overhead bytes;Path Overhead bytesE、Path Overhead bytes;Line Overhead bytes

考题 What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.

考题 Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing

考题 A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()A、The switches are not stackableB、The cable was not wired using 568AC、The cable needs to be a crossover cableD、The switches have IGMP snooping enabled

考题 Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()A、Reverse ARPB、Full duplex on the fiber linkC、PoED、802.1q trunking

考题 When testing a CAT5 cable, the technician notices that pin A is open. However, the cable stillworks fine. Which of the following describes how this is possible?()A、The cable was tested for 100Base-TX.B、The cable is a 1000BaseT cable.C、The switch uses link aggregation,D、The switch was setup to use MDIX

考题 Which of the following is the BEST to use when securing fiber cables and preventing damage?()A、Zip tiesB、Twist tiesC、Black electrical tapeD、Velcro cable straps

考题 单选题Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()A Reverse ARPB Full duplex on the fiber linkC PoED 802.1q trunking

考题 单选题What occurs on a Frame Relay network when the CIR is exceeded?()A All TCP traffic is marked discard eligibleB All UDP traffic is marked discard eligible and a BECN is sentC All TCP traffic is marked discard eligible and a BECN is sentD All traffic exceeding the CIR is marked discard eligible

考题 单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A  SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B  SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C  SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D  SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

考题 单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A Traffic is switched from the first node receiving the AIS indication.B Traffic is switched from the far side of the failure, allowing handshaking to occur.C UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 单选题When testing a CAT5 cable, the technician notices that pin A is open. However, the cable stillworks fine. Which of the following describes how this is possible?()A The cable was tested for 100Base-TX.B The cable is a 1000BaseT cable.C The switch uses link aggregation,D The switch was setup to use MDIX

考题 单选题A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()A The switches are not stackableB The cable was not wired using 568AC The cable needs to be a crossover cableD The switches have IGMP snooping enabled

考题 多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

考题 多选题What are two characteristics of dual-ring interconnect in SDH networks? ()AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

考题 单选题UPSR protection switching is initiated by (), while BLSR is initiated by ().A the K1 SONET byte; the K2 SONET byteB the K2 SONET byte;the K1 SONET byteC transmitter switching;receiver detectionD Line Overhead bytes;Path Overhead bytesE Path Overhead bytes;Line Overhead bytes

考题 单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply

考题 单选题What protection method is used in 4F BLSR networks?()A Each fiber has half of its SONET capacity reserved for protection.B Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.C The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

考题 单选题In which of the following lists of APS Action Requests is the priority correctly arranged from lowest tohighest?()A Wait-to-Restore,Forced Switch,Manual Switch,Lockout of ProtectionB Manual Switch,Wait-to-Restore,Lockout of Protection,Forced SwitchC Lockout of Protection,Forced Switch, Manual Switch,Wait-to-RestoreD Lockout of Protection,Manual Switch, Forced Switch,Wait-to-RestoreE Wait-to-Restore,Manual Switch,Forced Switch,Lockout of ProtectionF Wait-to-Restore,Manual Switch,Lockout of Protection,Forced Switch

考题 单选题What is the purpose of the limit switch on gravity davits?()A To cut off the power when the davits hit the track safety stopsB To stop the davits from going too fastC To cut off the power when the davits are about 12 inches or more from the track safety stopsD None of the above