多項(xiàng)選擇題Which four of these key points should be considered during implementation of PPPoA architecture?()

A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Where is the MPLS label imposed?()

A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload

2.多項(xiàng)選擇題Which three statements about the BGP next-hop attribute are true? ()

A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.

3.單項(xiàng)選擇題What is the port number of the IPsec Authentication Header packet?()

A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50

4.單項(xiàng)選擇題What does the protocol field inside the PPP frame indicate?()

A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes

5.多項(xiàng)選擇題Which three configuration options are available for configuring the l2tp-class command in L2TPv3?()

A.TCP port
B.authentication
C.IP DF bit
D.retransmit retries
E.sequencing
F.hostname

最新試題

Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

題型:多項(xiàng)選擇題

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()

題型:單項(xiàng)選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項(xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:單項(xiàng)選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項(xiàng)選擇題

Which two routers support cable access?()

題型:多項(xiàng)選擇題

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

題型:多項(xiàng)選擇題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:單項(xiàng)選擇題

Which statement about VPLS is true?()

題型:單項(xiàng)選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:單項(xiàng)選擇題