网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What protection method is used in 4F BLSR networks?()
A

Each fiber has half of its SONET capacity reserved for protection.

B

Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.

C

The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

D

The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


参考答案

参考解析
解析: 暂无解析
更多 “单选题What protection method is used in 4F BLSR networks?()A Each fiber has half of its SONET capacity reserved for protection.B Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.C The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.” 相关考题
考题 Packet switching is a method of slicing(71) messages into parcels called "packets," sending the packets along different communication(72) as they become available, and then reassembling the packets(73) they arrive at their destination. Prior to the development of packet switching, early computer networks used leased, dedicated telephone circuits to(74) with terminals and other computers. In circuit-switched networks such as the telephone system, a complete point-to-point(75) is put together, and then communication can proceed.A.binaryB.usefulC.digitalD.analog

考题 When ‘Final’ is used in class, method and property, what dose itmean?

考题 What is used to segment larger networks into smaller networks?() A.supernet masksB.subnet masksC.wildcard masksD.route filtering

考题 What is the correct relative switching priority in a BLSR ring (higher to lower)?() A. signal fail, signal degrade, manual switchB. signal degrade, signal fail, manual switchC. protection lockout, manual switch, path AISD. forced switch, manual switch, signal degradeE. protection lockout, manual switch, forced switch

考题 Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

考题 Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings

考题 What are three advantages of VLANs?()A、VLANs establish broadcast domains in switched networks.B、VLANs utilize packet filtering to enhance network security.C、VLANs provide a method of conserving IP addresses in large networks.D、VLANs provide a low-latency internet working alternative to routed networks.E、VLANs allow access to network services based on department, not physical location.F、VLANs can greatly simplify adding, moving, or changing hosts on the network.

考题 Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

考题 What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch

考题 What is true regarding Autonomous Systems (AS )?()A、AS numbers are assigned by the IANAB、AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring ASC、In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the controlD、All of the Above

考题 What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

考题 A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()  A、 sendmail -biB、 yes /dev/kmemC、 emulate errlog entryD、 reducevg vgname hdisk#

考题 How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement

考题 In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.

考题 What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

考题 单选题What protection method is used in 4F MS-SPRing networks?()A  Each fiber has half of its capacity reserved for protection.B  Two fibers carry their full capacities while the other two fibers are reserved for protection.C  The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D  The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

考题 单选题Which option describes the incorrect usage of the Label Distribution method?()A LDP is primarily used in internal networks of MPLS-VPN providers.B MP-BGP is used for label distribution for VPN customer routes.C Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

考题 单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A Traffic is switched from the first node receiving the AIS indication.B Traffic is switched from the far side of the failure, allowing handshaking to occur.C UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

考题 单选题Why is an OC-3 2F-BLSR not feasible?()A Switch times would exceed 50 ms for an OC-3 BLSR ring.B An equal amount of working and protect bandwidth is required.C DCC bandwidth is not large enough to handle K1/K2 processing.D There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

考题 单选题What is used to segment larger networks into smaller networks?()A supernet masksB subnet masksC wildcard masksD route filtering

考题 单选题A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()A  sendmail -biB  yes /dev/kmemC  emulate errlog entryD  reducevg vgname hdisk#

考题 单选题What is true regarding Autonomous Systems (AS )?()A AS numbers are assigned by the IANAB AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring ASC In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the controlD All of the Above

考题 单选题Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()A GRE tunnelsB automatic 6 to 4 tunnelsC ISATAP tunnelsD manual tunnels (RFC 2893)

考题 单选题What teaching method is used by the teacher if much of his/her class time is spent on drilling sentence patterns followed by exercises like repetition, memorization, mimicry, etc?A The Natural Approach.B The Communicative Approach.C The Audio-lingual Method.D The Grammar-translation Method.

考题 单选题How do you define the authentication method that will be used with AAA?()A With the method aaa commandB With the method commandC With a method listD With a method statement

考题 多选题What are three advantages of VLANs?()AVLANs establish broadcast domains in switched networks.BVLANs utilize packet filtering to enhance network security.CVLANs provide a method of conserving IP addresses in large networks.DVLANs provide a low-latency internet working alternative to routed networks.EVLANs allow access to network services based on department, not physical location.FVLANs can greatly simplify adding, moving, or changing hosts on the network.

考题 单选题What is the purpose of a network mask?()A It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB It is used to define which parts of the IP address are allocated to host addresses and network prefixesC It is used to hide subnets from external networks by masking the subnets with NATD It is used to differentiate a network as a classful network or a classless network