It is used to detect loops.
It is an interface identifier.
It selects a compression algorithm.
It specifies the transmission media.
第1题:
What is the purpose of a network mask?()
第2题:
What is the purpose of a chassis cluster?()
第3题:
What is the purpose of the OSPF router ID in a OR/BOR election?()
第4题:
What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()
第5题:
When sending an LCP Configuration Request,what can the ERX Edge Router possibly negotiate?()
第6题:
Chassis clusters are used to aggregate routes.
Chassis clusters are used to create aggregate interfaces.
Chassis clusters are used to group two chassis into one logical chassis.
Chassis clusters are used to group all interfaces into one cluster interface.
第7题:
enabling modular QoS over Frame Relay
enabling Real-Time Transport Protocol (RTP) header compression
enabling distributed compressed Transmission Control Protocol
enabling latency and jitter reduction for Transmission Control traffic
enabling TCP header compression
第8题:
profile
policylist
classifier ACL
LCP negotiation
第9题:
It is used to identify the maximum hop count of a subnetwork
It is used to identify an IP address as either private or public
It is used to identify the network to which an IP address belongs
It is used to identify the total number of bits present in an IP address
第10题:
Link Control Protocol(LCP) is used for basic PPP link setup and operation
Link Control Protocol(LCP) is used for denying PPP connections to unauthorized devices.
Link Control Protocol(LCP) for PPP is synonymous to ARP for Ethernet.
None of the above
第11题:
It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
It is used to determine which interfaces will send Hello packets to neighboring OSPF routers
第12题:
the protocol used to determine the authentication method
the protocol used to identify the data in the Information field
the protocol used to carry the PPP frame
the protocol used to decode the FCS field
the protocol used to detect the number of padding bytes
第13题:
What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()
第14题:
In JUNOS software, what is the purpose of the eui-64 command?()
第15题:
What is the purpose of a network mask?()
第16题:
What is the purpose of the magic number in an LCP negotiation?()
第17题:
You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()
第18题:
Turning the laser to a specific ITU channel
Keeping the signal wavelength locked to a specific technology
Suppressing FWM and SBS non-linear effects
None ofthe above
第19题:
It is used in conjunction with the wildcard mask to determine the number of hosts on a network
It is used to define which parts of the IP address are allocated to host addresses and network prefixes
It is used to hide subnets from external networks by masking the subnets with NAT
It is used to differentiate a network as a classful network or a classless network
第20题:
It defines which devices will be sending traps.
It specifies where to send traps.
It defines the IP addresses of management systems that can access the device.
It specifies which devices can be polled for SNMP data.
第21题:
Automatically create the IS-IS NET ID
Dynamically create an MPLS router ID
Automatically assign the host number of an IPv6 address.
Dynamically assign a MAC address to an Ethernet interface.
第22题:
It is used to detect loops.
It is an interface identifier.
It selects a compression algorithm.
It specifies the transmission media.
第23题:
policy list
RADIUS VSA
classifier ACL
LCP negotiation
第24题:
The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
Only the BZIP2 compression algorithm can be used to make compressed backups to disk.