网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
A

 SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.

B

 SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.

C

 SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.

D

 SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.


参考答案

参考解析
解析: 暂无解析
更多 “单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A  SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B  SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C  SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D  SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.” 相关考题
考题 How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?() A. Traffic is switched from the first node receiving the AIS indication.B. Traffic is switched from the far side of the failure, allowing handshaking to occur.C. UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D. UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.) A. It protects signals against node failures between rings.B. It protects signals against node failure within a single ring.C. It allows for traffic to be preempted when a ring switch occurs.D. Traffic can be dropped and continued at interconnecting nodes.E. It protects preemptible traffic from being dropped when a ring switch occurs.

考题 The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?() A. FTP traffic from 192.169.1.22 will be denied.B. No traffic, except for FTP traffic will be allowed to exit E0.C. FTP traffic from 192.169.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.169.1.9/29 will be denied.

考题 How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

考题 ______ is not likely to be a methods of Traffic Separation.A.Separation of opposing streams of traffic by separation zones or linesB.The separation of through traffic from local traffic by provision of inshore traffic zonesC.Division of traffic from several different direction into sectorsD.Control of routing traffic through shipping routes

考题 MPLS应用应用与以下哪些方面()。A、MPLS VPNB、Traffic EngineeringC、Fast RerouteD、以上都是

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、 SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B、 SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C、 SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D、 SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

考题 Which of the following is not a characteristic of fast switching?()A、Fast switching reducesa routers CPU utilization, compared to process switchingB、All packets of a flow, except for the first packet, use the information in the fast cacheC、It can be enabled with the interface command ip route-cacheD、Fast switching uses a fast cache maintained in a router’s control planeE、The fast cache contains information about how traffic from different data flows should beforwardedF、Even though the fast switching is enabled, the first packet of a flow is still process switched

考题 A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A、All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB、Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC、All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD、All traffic is flooded out all ports and an attacker is able to capture all dataE、None of the other alternatives apply

考题 What are two major differences between MS-SPRing and SNCP?()A、 In an MS-SPRing, all paths are protected.B、 MS-SPRing is always a high-order protection.C、 A low order circuit cannot be protected by an MS-SPRing.D、 There is no theoretical limit in the number of nodes in an SNCP ring.

考题 What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.

考题 Which four services use the inner labels of an MPLS label stack? ()A、MPLS VPNB、switching path in MPLS coreC、Cisco MPLS Traffic Engineering and Fast RerouteD、MPLS over ATME、VPN over Traffic Engineering coreF、any transport over MPLS

考题 How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 单选题The new traffic rules will become _____ from the first day of 2016.A comfortableB excellentC challengingD effective

考题 单选题Which of the following is not a characteristic of fast switching?()A Fast switching reducesa routers CPU utilization, compared to process switchingB All packets of a flow, except for the first packet, use the information in the fast cacheC It can be enabled with the interface command ip route-cacheD Fast switching uses a fast cache maintained in a router’s control planeE The fast cache contains information about how traffic from different data flows should beforwardedF Even though the fast switching is enabled, the first packet of a flow is still process switched

考题 单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A Traffic is switched from the first node receiving the AIS indication.B Traffic is switched from the far side of the failure, allowing handshaking to occur.C UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 单选题The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()A FTP traffic from 192.169.1.22 will be deniedB No traffic, except for FTP traffic will be allowed to exit E0C FTP traffic from 192.169.1.9 to any host will be deniedD All traffic exiting E0 will be deniedE All FTP traffic to network 192.169.1.9/29 will be denied

考题 单选题Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()A  Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.B  No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.C  No. Traffic will loop back and forth between switch S5 and S2.D  Yes. Traffic will pass from switch S6 to S3 to S2 to S1.E  No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.

考题 多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

考题 单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply

考题 单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed

考题 单选题() is not likely to be a methods of Traffic Separation.A Separation of opposing streams of traffic by separation zones or linesB The separation of through traffic from local traffic by provision of inshore traffic zonesC Division of traffic from several different direction into sectorsD Control of routing traffic through shipping routes

考题 单选题How will the above access lists affect traffic?()A FTP traffic from 192.169.1.22 will be deniedB No traffic, except for FTP traffic will be allowed to exit E0C FTP traffic from 192.169.1.9 to any host will be deniedD All traffic exiting E0 will be deniedE All FTP traffic to network 192.169.1.9/29 will be denied

考题 单选题When the farmers visited the city for the first time, they were _____ by its complicated traffic system.A evokedB bewilderedC divertedD undermined

考题 单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A  SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B  SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C  SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D  SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

考题 多选题What are two characteristics of dual-ring interconnect in SDH networks? ()AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

考题 多选题What are two major differences between MS-SPRing and SNCP?()AIn an MS-SPRing, all paths are protected.BMS-SPRing is always a high-order protection.CA low order circuit cannot be protected by an MS-SPRing.DThere is no theoretical limit in the number of nodes in an SNCP ring.