單項(xiàng)選擇題What best describes the usage of Route-Target rewrite?()

A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()

A.It is the Routing protocol used between ATM switches
B.PNNI uses the same Dijsktra algorithm for SPF calculation
C.PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D.PNNI measures line capacities and delays in addition to simple cost metrics

2.單項(xiàng)選擇題What OSPF LSA is used to support MPLS-traffic Engineering ?()

A.External LSA (Type 5 )
B.Opaque LSA (Type 9 )
C.Opaque LSA (Type 10 )
D.Opaque LSA (Type 11 )
E.NSSA LSA (Type 7 )

3.多項(xiàng)選擇題Select the two answers that best describe the IP Event Dampening feature()

A.The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B.BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C.The IP Event Dampening works with routing protocols by stopping the announcement of dampened interface subnets in their updates
D.When IP Event Dampened internet routes resch their re-use limit BGP installs them in the Routing Table and announces them to other BGP speakers

4.單項(xiàng)選擇題What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potentialexit point out of the area ?()

A.ATT(Attached)bit
B.IS-Type bits
C.P(Partition)bit
D.Down bit
E.PN(Pseudonode)biy
F.ABR(Area Border Rorter)bit

5.單項(xiàng)選擇題What is jitter?()

A.The total end-to-end delay
B.The variations of delay.
C.The delay caused by placing the bits on the wire.
D.The time it takes for the bits to transit the physical media.

最新試題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

Which two statements about 10 Gigabit Ethernet (10GE) are true?()

題型:多項(xiàng)選擇題

Which statement is FALSE concerning Concatenation?()

題型:單項(xiàng)選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項(xiàng)選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項(xiàng)選擇題

Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()

題型:單項(xiàng)選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項(xiàng)選擇題

Which two statements about Layer 3 MPLS VPN are true?()

題型:多項(xiàng)選擇題

Which information is carried in the OSPFv3 intra-area Prefix LSA?()

題型:單項(xiàng)選擇題

MPLS label mapping on an LSR is displayed by which IOS command?()

題型:單項(xiàng)選擇題