How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A. Traffic is switched from the first node receiving the AIS indication.B. Traffic is switched from the far side of the failure, allowing handshaking

题目
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()

A. Traffic is switched from the first node receiving the AIS indication.

B. Traffic is switched from the far side of the failure, allowing handshaking to occur.

C. UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.

D. UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.


相似考题
更多“How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?() ”相关问题
  • 第1题:

    Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()

    A. PPMN with BLSR rings

    B. PPMN with UPSR rings

    C. 1:N protection on all core circuits

    D. multi-ring interconnect with BLSR rings


    参考答案:B

  • 第2题:

    What is the correct relative switching priority in a BLSR ring (higher to lower)?()

    • A、signal fail, signal degrade, manual switch
    • B、signal degrade, signal fail, manual switch
    • C、protection lockout, manual switch, path AIS
    • D、forced switch, manual switch, signal degrade
    • E、protection lockout, manual switch, forced switch

    正确答案:A

  • 第3题:

    UPSR protection switching is initiated by (), while BLSR is initiated by ().

    • A、the K1 SONET byte; the K2 SONET byte
    • B、the K2 SONET byte;the K1 SONET byte
    • C、transmitter switching;receiver detection
    • D、Line Overhead bytes;Path Overhead bytes
    • E、Path Overhead bytes;Line Overhead bytes

    正确答案:E

  • 第4题:

    Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()

    • A、DoS
    • B、Smurf
    • C、Man-in-the-middle
    • D、Phishing

    正确答案:C

  • 第5题:

    Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()

    • A、Reverse ARP
    • B、Full duplex on the fiber link
    • C、PoE
    • D、802.1q trunking

    正确答案:D

  • 第6题:

    Which of the following is the BEST to use when securing fiber cables and preventing damage?()

    • A、Zip ties
    • B、Twist ties
    • C、Black electrical tape
    • D、Velcro cable straps

    正确答案:D

  • 第7题:

    单选题
    What occurs on a Frame Relay network when the CIR is exceeded?()
    A

    All TCP traffic is marked discard eligible

    B

    All UDP traffic is marked discard eligible and a BECN is sent

    C

    All TCP traffic is marked discard eligible and a BECN is sent

    D

    All traffic exceeding the CIR is marked discard eligible


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
    A

    Traffic is switched from the first node receiving the AIS indication.

    B

    Traffic is switched from the far side of the failure, allowing handshaking to occur.

    C

    UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.

    D

    UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()
    A

    The switches are not stackable

    B

    The cable was not wired using 568A

    C

    The cable needs to be a crossover cable

    D

    The switches have IGMP snooping enabled


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    What are two characteristics of dual-ring interconnect in SDH networks? ()
    A

    It protects signals against node failures between rings.

    B

    It protects signals against node failure within a single ring.

    C

    It allows for traffic to be preempted when a ring switch occurs.

    D

    Traffic can be dropped and continued at interconnecting nodes.

    E

    It protects preemptible traffic from being dropped when a ring switch occurs.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    单选题
    A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
    A

    All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable

    B

    Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns

    C

    All traffic is redirected to the VLAN that the attacker used to flood the CAM table

    D

    All traffic is flooded out all ports and an attacker is able to capture all data

    E

    None of the other alternatives apply


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    In which of the following lists of APS Action Requests is the priority correctly arranged from lowest tohighest?()
    A

    Wait-to-Restore,Forced Switch,Manual Switch,Lockout of Protection

    B

    Manual Switch,Wait-to-Restore,Lockout of Protection,Forced Switch

    C

    Lockout of Protection,Forced Switch, Manual Switch,Wait-to-Restore

    D

    Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore

    E

    Wait-to-Restore,Manual Switch,Forced Switch,Lockout of Protection

    F

    Wait-to-Restore,Manual Switch,Lockout of Protection,Forced Switch


    正确答案: B
    解析: 暂无解析

  • 第13题:

    What is the purpose of the limit switch on gravity davits?

    A.To cut off the power when the davits hit the track safety stops

    B.To stop the davits from going too fast

    C.To cut off the power when the davits are about 12 inches or more from the track safety stops

    D.None of the above


    正确答案:C

  • 第14题:

    How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()

    • A、Traffic is switched from the first node receiving the AIS indication.
    • B、Traffic is switched from the far side of the failure, allowing handshaking to occur.
    • C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.
    • D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

    正确答案:D

  • 第15题:

    What are two characteristics of dual-ring interconnect in SDH networks? ()

    • A、 It protects signals against node failures between rings.
    • B、 It protects signals against node failure within a single ring.
    • C、 It allows for traffic to be preempted when a ring switch occurs.
    • D、 Traffic can be dropped and continued at interconnecting nodes.
    • E、 It protects preemptible traffic from being dropped when a ring switch occurs.

    正确答案:A,D

  • 第16题:

    A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()

    • A、The switches are not stackable
    • B、The cable was not wired using 568A
    • C、The cable needs to be a crossover cable
    • D、The switches have IGMP snooping enabled

    正确答案:C

  • 第17题:

    When testing a CAT5 cable, the technician notices that pin A is open. However, the cable stillworks fine. Which of the following describes how this is possible?()

    • A、The cable was tested for 100Base-TX.
    • B、The cable is a 1000BaseT cable.
    • C、The switch uses link aggregation,
    • D、The switch was setup to use MDIX

    正确答案:A

  • 第18题:

    单选题
    Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107.Both switches are connected with a fiber cable. In order for packets from all VLANs to cross thefiber cable, which of the following configurations MUST be present? ()
    A

    Reverse ARP

    B

    Full duplex on the fiber link

    C

    PoE

    D

    802.1q trunking


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
    A

     SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.

    B

     SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.

    C

     SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.

    D

     SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    When testing a CAT5 cable, the technician notices that pin A is open. However, the cable stillworks fine. Which of the following describes how this is possible?()
    A

    The cable was tested for 100Base-TX.

    B

    The cable is a 1000BaseT cable.

    C

    The switch uses link aggregation,

    D

    The switch was setup to use MDIX


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)
    A

    It protects signals against node failures between rings.

    B

    It protects signals against node failure within a single ring.

    C

    It allows for traffic to be preempted when a ring switch occurs.

    D

    Traffic can be dropped and continued at interconnecting nodes.

    E

    It protects preemptible traffic from being dropped when a ring switch occurs.


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    单选题
    UPSR protection switching is initiated by (), while BLSR is initiated by ().
    A

    the K1 SONET byte; the K2 SONET byte

    B

    the K2 SONET byte;the K1 SONET byte

    C

    transmitter switching;receiver detection

    D

    Line Overhead bytes;Path Overhead bytes

    E

    Path Overhead bytes;Line Overhead bytes


    正确答案: E
    解析: 暂无解析

  • 第23题:

    单选题
    What protection method is used in 4F BLSR networks?()
    A

    Each fiber has half of its SONET capacity reserved for protection.

    B

    Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.

    C

    The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

    D

    The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    What is the purpose of the limit switch on gravity davits?()
    A

    To cut off the power when the davits hit the track safety stops

    B

    To stop the davits from going too fast

    C

    To cut off the power when the davits are about 12 inches or more from the track safety stops

    D

    None of the above


    正确答案: C
    解析: 暂无解析