网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()
A

MP-BGP routing

B

Static routing

C

Policy routing

D

Autoroute

E

Forwarding adjacency


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()AMP-BGP routingBStatic routingCPolicy routingDAutorouteEForwarding adjacency” 相关考题
考题 Given the configuration shown in the exhibit, which statement is correct about traffic matching the route 10.10.10.0/24?() A. It will be forwarded to 192.168.100.1 using a metric of 10.B. It will be forwarded to 192.168.100.1 using a metric of 8.C. It will be forwarded to 192.168.200.1 using a metric of 8.D. It will be forwarded to 192.168.200.1 using a metric of 10.

考题 What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?() A. No action required, wide metrics are used by default in IS-IS.B. Enable wide-metrics-only under protocols IS-IS.C. Enable traffic-engineering under protocols IS-IS.D. Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).

考题 Which three methods can you use for route discovery on a WX platform? ()(Choose three.) A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server

考题 Which statement is correct regarding exception traffic processing?() A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries

考题 Which statement describes transit traffic?() A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C. Any traffic that requires the generation of an ICMP message.D. Traffic that requires some form of special attention and does not pass through the device.

考题 A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?() A. Enable TPMB. Enable BIOS passwordC. Disable TPMD. Boot sequence

考题 Which statement about IDS/IPS design is correct?()A、An IPS should be deployed if the security policy does not support the denial of traffic.B、An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C、An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D、Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()A、MP-BGP routingB、Static routingC、Policy routingD、AutorouteE、Forwarding adjacency

考题 A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?()A、Enable TPMB、Enable BIOS passwordC、Disable TPMD、Boot sequence

考题 Which three methods can you use for route discovery on a WX platform? ()(Choose three.)A、Enable RIPB、Enable OSPFC、Periodically poll any routerD、Import routes from a TFTP server

考题 Which statement describes transit traffic?()A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C、Any traffic that requires the generation of an ICMP message.D、Traffic that requires some form of special attention and does not pass through the device.

考题 When using OSPF as your IGP, which operational command must be enabled to populate the TED forCSPF calculations?()A、cspf enableB、disable no-cspfC、traffic-engineeringD、enable traffic-engineering-database

考题 Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

考题 Several troubleshooters are about to work on the same problem. Which of the followingtroubleshooting methods would be most appropriate to make the best use of the troubleshooters1time?()A、Bottom upB、Component swappingC、Top downD、Shoot from the hipE、Divide and conquerF、Follow the traffic path

考题 Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

考题 A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A、Remark the traffic on ingress and prioritize on egress.B、Enable CEF and Netflow. C、Configure the MS-Windows QoS Scheduler to prioritize this traffic.D、Enable WRED.

考题 Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A、source IP address and the protocol (such as SSL,HTTPS,SSH)B、the packet Time to Live and the source IP addressC、type of service header and DSCP valueD、destination IP address

考题 Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec

考题 Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题Which statement about IDS/IPS design is correct?()A An IPS should be deployed if the security policy does not support the denial of traffic.B An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 多选题In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()AMSDPBRouting policyCAdministrative scopingDBootstrap export policy

考题 单选题Which statement describes transit traffic?()A Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C Any traffic that requires the generation of an ICMP message.D Traffic that requires some form of special attention and does not pass through the device.

考题 单选题Which statement is correct regarding exception traffic processing?()A Exception traffic is only handled by the PFEB Exception traffic is rate-limited across the internal link to protect the REC Exception traffic is not prioritized during times of congestionD Exception traffic is forwarded based on forwarding table entries

考题 单选题Several troubleshooters are about to work on the same problem. Which of the followingtroubleshooting methods would be most appropriate to make the best use of the troubleshooters1time?()A Bottom upB Component swappingC Top downD Shoot from the hipE Divide and conquerF Follow the traffic path

考题 单选题Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A source IP address and the protocol (such as SSL,HTTPS,SSH)B the packet Time to Live and the source IP addressC type of service header and DSCP valueD destination IP address

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ