A.normal
B.discard
C.random
D. full
您可能感興趣的試卷
你可能感興趣的試題
A.There is a full mesh of pseudowires.
B.There is a partial mesh of pseudowires.
C.Only L2TPv3 can be used for pseudowire establishment.
D.There is split-horizon to avoid loops.
A.Allow a CSS to probe the server
B.Allow a connection to be closed with a TCP RESET
C.Allow persistent connections
D.Allow the use of HTTP HEAD request
A.Addition or Deletion of PVC
B.PVC status (active or inactive)
C.Link integrity
D.None of the other alternatives apply
A.It provides comprehensive Domain Name system
B.It provides DHCP administrative functionality
C.It provides TFTP server functionality.
D.All of the above are true
A.UniDirectional Loop Detection
B.Unspecified Distribution Label Detection
C.Unified Distribution Label Direction
D.UniDirectional Link Detection
最新試題
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which statement about multicast VPN is true?()
Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()
Which three things are the building blocks of the Cisco VPLS architecture?()
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which statement about the use of Route Target Rewrite is true?()