InMulticastVPN(MVPN)implementations,whichtwoofthefollowingstatementsareregardingtheDefaultMDTGroup?()A.ItisusedforPIMcontroltrafficB.Itisoptionallyconfiguredforahighbandwidthmulticastsourcetoreducemulticasttrafficreplication to uninterestedPEroutersC.With

题目
InMulticastVPN(MVPN)implementations,whichtwoofthefollowingstatementsareregardingtheDefaultMDTGroup?()

A.ItisusedforPIMcontroltraffic

B.Itisoptionallyconfiguredforahighbandwidthmulticastsourcetoreducemulticasttrafficreplication to uninterestedPErouters

C.WithintheVPFconfigurationinthePErouter,multipleDefaultMDTgroupsareconfiguredsoeach VPFcansupportmultiplemulticastsources

D.ThereisareducedmulticaststateintheMPLScoreProuters

E.Whenmulticasttrafficexceedsacertainconfiguredthreshold,trafficfromtheDataMDTisswitched to theDefaultMDTtoconservebandwidth


相似考题
参考答案和解析
参考答案:A, D
更多“InMulticastVPN(MVPN)implementations,whichtwoofthefollowingstatementsareregardingtheDefaultMDTGroup?() ”相关问题
  • 第1题:

    Refer to the exhibit. You have completed an OSPF implementation, and you are verifying OSPF operation. You notice that router A and router B are stuck in the two - way state. From the show ip ospf interface command output, what is the cause of this issue?()

    A. All OSPF implementations must have at le ast one interface in area 0.

    B. You are attempting to run in the broadcast mode over an NBMA interface.

    C. Both routers are configured to function as a BDR; therefore, there is no DR router.

    D. Someone has changed the OSPF router ID; therefore you must clear the OSPF process.

    E. The OSPF priority is set to 0 on both routers; therefore neither can become the DR.


    参考答案:E

  • 第2题:

    TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()


    参考答案:A, B

  • 第3题:

    WhenconfiguringMulticastVPN(MVPN)overanMPLScore,boththeDefaultandDataMDTisconfiguredunderwhichconfigurationmode?()

    A.router(config)#

    B.router(config-if)#

    C.router(config-vrf)#

    D.router(config-router)#

    E.router(config-router-af)#


    参考答案:C

  • 第4题:

    What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()

    • A、They are used to find the best path through a network.
    • B、They allow the exchange of filtering tables.
    • C、They specify different implementations of the Spanning-Tree Protocol.
    • D、They allow the exchange of routing tables
    • E、They provide inter-switch VLAN communication.

    正确答案:E

  • 第5题:

    Which two statements about the implementation of WLAN QoS are true?()

    • A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.
    • B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.
    • C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.
    • D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.
    • E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.
    • F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

    正确答案:A,B

  • 第6题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第7题:

    Which two routing interface parameters are supported in OSPF implementations?()

    • A、retransmit - interval
    • B、de ad - interval
    • C、stub area
    • D、virtual link
    • E、NSSA area

    正确答案:A,B

  • 第8题:

    Which of the following BEST describes how server virtualization can cut down IT costs? ()

    • A、 Server virtualization increases server application performance allowing productivity to be increased.
    • B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.
    • C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.
    • D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

    正确答案:D

  • 第9题:

    多选题
    Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()
    A

    VPLS uses LDP for signaling.

    B

    VPLS uses BGP for autodiscovery and signaling.

    C

    VPLS uses extended IS-IS for signaling

    D

    VPLS uses OSPF version 3 for auto discovery and signaling

    E

    VPLS uses spanning tree for signaling


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    单选题
    What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?()
    A

    IP unicast in IP unicast

    B

    IP multicast in IP anycast

    C

    IP anycast in IP anycast

    D

    IP multicast in IP unicast

    E

    IP multicast in IP multicast

    F

    IP unicast in IP multicast


    正确答案: E
    解析: 暂无解析

  • 第11题:

    多选题
    Which two routing interface parameters are supported in OSPF implementations?()
    A

    retransmit - interval

    B

    de ad - interval

    C

    stub area

    D

    virtual link

    E

    NSSA area


    正确答案: A,E
    解析: 暂无解析

  • 第12题:

    单选题
    What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()
    A

    They are used to find the best path through a network.

    B

    They allow the exchange of filtering tables.

    C

    They specify different implementations of the Spanning-Tree Protocol.

    D

    They allow the exchange of routing tables

    E

    They provide inter-switch VLAN communication.


    正确答案: E
    解析: 暂无解析

  • 第13题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    A. intrusion protection

    B. identity

    C. secure connectivity

    D. security management


    参考答案:B, D

  • 第14题:

    WhatistheencapsulationformatofanMPLSMulticastVPN(MVPN)packer?()

    A.IPunicastinIPunicast

    B.IPmulticastinIPanycast

    C.IPanycastinIPanycast

    D.IPmulticastinIPunicast

    E.IPmulticastinIPmulticast

    F.IPunicastinIPmulticast


    参考答案:E

  • 第15题:

    Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations. Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()

    • A、IBMeConfig
    • B、IBM Performance Monitor
    • C、IBM Workload Estimator (WLE)
    • D、IBM System Planning Tool (SPT)

    正确答案:D

  • 第16题:

    When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()

    • A、router(config)#
    • B、router(config-if)#
    • C、router(config-vrf)#
    • D、router(config-router)#
    • E、router(config-router-af)#

    正确答案:C

  • 第17题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第18题:

    What is an advantage of the IntServ QoS model?()

    • A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).
    • B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.
    • C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).
    • D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.
    • E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.

    正确答案:A

  • 第19题:

    What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?()

    • A、IP unicast in IP unicast
    • B、IP multicast in IP anycast
    • C、IP anycast in IP anycast
    • D、IP multicast in IP unicast
    • E、IP multicast in IP multicast
    • F、IP unicast in IP multicast

    正确答案:E

  • 第20题:

    单选题
    Which IOS feature provides dial plan scalability and bandwidth management for H.323 VoIP implementations?()
    A

    gatekeeper

    B

    Call Routing

    C

    Call Admission Control

    D

    Digital Signal Processors


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()
    A

    router(config)#

    B

    router(config-if)#

    C

    router(config-vrf)#

    D

    router(config-router)#

    E

    router(config-router-af)#


    正确答案: E
    解析: 暂无解析

  • 第22题:

    多选题
    In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()
    A

    It is used for PIM control traffic

    B

    It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers

    C

    Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources

    D

    There is a reduced multicast state in the MPLS core P routers

    E

    When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    单选题
    Multi Protocol Label Switching (MPLS) is a data-carrying mechanism that belongs to the family of packet-switched networks. For an MPLS label, if the stack bit is set to1, which option is true?()
    A

    The stack bit will only be used when LDP is the label distribution protocol

    B

    The label is the last entry in the label stack.

    C

    The stack bit is for Cisco implementations exclusively and will only be used when TDP is the label distribution protocol.

    D

    The stack bit is reserved for future use.


    正确答案: C
    解析: 暂无解析