Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
第1题:
Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
第2题:
Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()
第3题:
Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)
第4题:
Which of the following statements is correct regarding a hybridcrypto system?()
第5题:
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
第6题:
Using the Tivoli Dynamic Workload Console, what are two ways to change the priority of a job?()
第7题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第8题:
uses symmetric crypto for keys distribution
uses symmetric crypto for proof of origin
uses symmetric crypto for fast encrypted/decryption
uses asymmetric crypto for message confidentiality
uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session
第9题:
LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第10题:
A based opt-in model uses virtualized identifiers
A based opt-in model uses hardware values as identifiers
A logical server opt-in model uses virtualized identifiers
A logical server opt-in model uses hardware values as identifiers
第11题:
MPLS TE supports admission control
MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path
MPLS TE uses BGP extension to advertise link attributes
MPLS TE provides protection capability
MPLS TE uses RSVP to establish LSP
第12题:
Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.
Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.
ISDN BRIs implement channel-associated signaling.
第13题:
Which tow statements are most correct regarding opt-in models?()
第14题:
Which two statements are true about RSVP and the InServ QoS model?()
第15题:
Which statement is true about IP telephony calls?()
第16题:
Which of the following statements are true? ()
第17题:
It is important to note that from the core company’s perspective, the supply chain includes (), upstream supplier and down stream customers.
第18题:
Using Job Scheduling Console, how can the external successor chain be viewed when a job needs to be canceled?()
第19题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第20题:
a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol
RSVP uses DSCP to signal QoS requirements to routers
RSVP is a routing protocol
RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455
RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic
the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet
第21题:
using the Hyperbolic Viewer
opening the Impact view and displaying the successors
opening the Job Stream Instance editor for its Job Stream Instance
opening the Dependencies window and drilling down to the successors
第22题:
Ordered Control
Independent Control
Down Stream Unsolicited
Liberal Label Management
Down Stream On Demand
第23题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.