In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()
A . It adds the VPN label into the top label in the MPLS label stack
B . It replaces the top label in the MPLS label stack with a VPN label and propagates
C . It replaces the bottom label in the MPLS label stack with a VPN label and propagates
D . It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packets
E . None of above
相似题目
-
How are RIP routing contexts implemented in MPLS VPN? ()
A . RIP does not support routing contexts
B . routing contexts are implemented in a single routing process
C . routing contexts are implemented using multiple routing processes
D . routing contexts are implemented as several instances of a single routing process
E . routing contexts are implemented as a single instance of several routing processe
-
In MPLS networks, what s the benefit of disabling TTL propagation?()
A . To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B . To improve the IGP convergence time
C . To hide visibility to the core (provider) routers in the MPLS network
D . To provide a visible extension of IP TTL functionality in an MPLS-enabled domai
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
Utterance is based on ();it is the realization of the abstract meaning of a sentence in a real situation of communication,or simply in a context.
-
What is the action of "pop" in the context of MPLS switching?()
A . It removes the top label in the MPLS label stack.
B . It adds a top label in MPLS label stack.
C . It replaces the top label in the MPLS label stack with another value.
D . It replaces the top label in the MPLS label stack with a set of labels.
E . None of above.
-
In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()
A . to identify valid numbers for incoming calls
B . to define the type of ISDN switch at the central office
C . to specify the list of outgoing phone numbers used by the router
D . to associate a dial configuration with a physical interface
E . to define interesting traffic that will enable the link
-
Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()
A . The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSR
B . TTL propagation cannot be disabled in an MPLS domain
C . TTL propagation is only disabled on the ingress edge LSR
D . The TTL field of the MPLS label header is set to 255
E . The TTL field of the IP packet is set to 0
-
In the context of GMPLS,LMP stands for().
A . Loop Management Protocol
B . Label Management Protocol
C . Load Management Protocol
D . Link Management Protocol
E . None of above
-
The correct meaning of a lexical item in a given context is____.
A . the one provided in a dictionary
B . the one which best fits the context
C . the central or core meaning of the item
D . the one which is assumed to be correct
-
The correct meaning of a lexical item in a given context is__.
A . the one provided in a dictionary
B . the one which best fits the context
C . the central or core meaning of the item
D . the one which is assumed to be correct
-
In the context of MPLS Traffic engineering, TE path calculation is conducted by().
A . TE middle point
B . TE tail end
C . TE head end
D . All TE nodes along the path
E . Independent server
-
In the context of Advanced Power Virtualization, the shared pool refers to which of the following?()
A . A pool of physical memory that can be used by any partition
B . A pool of physical processors that can be used by any virtual or dedicated partition
C . A pool of physical memory that can be used by multiple Micro-Partitions
D . A pool of physical processors that can be used by multiple Micro-Partitio
-
Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()
A . Dedicated paths between sending and receiving hosts are established.
B . Multiple subnetwork broadcast addresses are created.
C . Multiple ARP tables are needed.
D . The decrease in the number of collision domains.
E . Broadcast domains are enhanced.
F . Additional bandwidth is used to connect hosts.
-
In MPLS traffic engineering, which one of the following protocols is used for Path Setup?()
A . BGP
B . OSPF
C . ISIS
D . RSVP
-
In high context culture, there is more of a quiet understanding of what is going on and less is said about it, as in the end we should be just ‘understood’.
-
Wha t is the function of Language of Three?
-
In high-context culture, the mass of information is vested in the explicit code.
-
In which of the following contexts could we use the idiom “ 按图索骥 ” ?
-
In high-context cultures, information is provided through _____, the use of _____, and even _____.
-
In low context cultures, the verbal message contains most of the information and very little is shown in the _____ or the _____.
-
In the context of the reading, what does the word reserving most closely mean?
-
In the context of object-oriented software engineering a component contains()
A.attribute and operations
B.instances of each class
C.roles for each actor(device or user)
D.set of collaborating classes
-
In ZTE's T-MPLS protection, which of the following external commands are supporte
A.A.nworking lock
B.B.nprotection lock
C.C.nforced switching
D.D.nmanual switching
-
These risk factors are not present in all social and cultural contexts, but provide an overview when we attempt to understand the causes of child maltreatment