多項選擇題Which four of these key points should be considered during implementation of PPPoA architecture?()

A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Where is the MPLS label imposed?()

A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload

2.多項選擇題Which three statements about the BGP next-hop attribute are true? ()

A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.

3.單項選擇題What is the port number of the IPsec Authentication Header packet?()

A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50

4.單項選擇題What does the protocol field inside the PPP frame indicate?()

A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes

5.多項選擇題Which three configuration options are available for configuring the l2tp-class command in L2TPv3?()

A.TCP port
B.authentication
C.IP DF bit
D.retransmit retries
E.sequencing
F.hostname