niusouti.com

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)A、LDP uses Down Stream On Demand.B、RSVP uses Down Stream On Demand.C、LDP uses Down Stream Unsolicited.D、RSVP uses Down Stream Unsolicited.

题目

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)

  • A、LDP uses Down Stream On Demand.
  • B、RSVP uses Down Stream On Demand.
  • C、LDP uses Down Stream Unsolicited.
  • D、RSVP uses Down Stream Unsolicited.

相似考题
更多“Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)A、LDP uses Down Stream On Demand.B、RSVP uses Down Stream On Demand.C、LDP uses Down Stream Unsolicited.D、RSVP uses Down Stream Unsolicited.”相关问题
  • 第1题:

    Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()

    • A、 Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
    • B、 Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.
    • C、 Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
    • D、 Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.
    • E、 ISDN BRIs implement channel-associated signaling.

    正确答案:A,D

  • 第2题:

    Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()

    • A、VPLS uses LDP for signaling.
    • B、VPLS uses BGP for autodiscovery and signaling.
    • C、VPLS uses extended IS-IS for signaling
    • D、VPLS uses OSPF version 3 for auto discovery and signaling
    • E、VPLS uses spanning tree for signaling

    正确答案:A,B

  • 第3题:

    Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)

    • A、Ordered Control
    • B、Independent Control
    • C、Down Stream Unsolicited
    • D、Liberal Label Management
    • E、Down Stream On Demand

    正确答案:A,D,E

  • 第4题:

    Which of the following statements is correct regarding a hybridcrypto system?()

    • A、 uses symmetric crypto for keys distribution
    • B、 uses symmetric crypto for proof of origin
    • C、 uses symmetric crypto for fast encrypted/decryption
    • D、 uses asymmetric crypto for message confidentiality
    • E、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

    正确答案:C

  • 第5题:

    Which three statements about MPLS traffic engineering (MPLS TE) are true? ()

    • A、MPLS TE supports admission control
    • B、MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path
    • C、MPLS TE uses BGP extension to advertise link attributes
    • D、MPLS TE provides protection capability
    • E、MPLS TE uses RSVP to establish LSP

    正确答案:A,D,E

  • 第6题:

    Using the Tivoli Dynamic Workload Console, what are two ways to  change the priority of a job?()

    • A、 Open the "Set Priority" panel from the job properties.
    • B、 Change the priority of the job stream that contains the job.
    • C、 Select the corresponding action from the Monitor jobs task panel.
    • D、 Open the job stream properties and drill down to the job priority  panel.
    • E、 The priority of a job can only be changed from the Workload  Designer.

    正确答案:A,C

  • 第7题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:A,D

  • 第8题:

    单选题
    Which of the following statements is correct regarding a hybridcrypto system?()
    A

     uses symmetric crypto for keys distribution

    B

     uses symmetric crypto for proof of origin

    C

     uses symmetric crypto for fast encrypted/decryption

    D

     uses asymmetric crypto for message confidentiality

    E

     uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session


    正确答案: E
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
    A

    LDP uses Down Stream On Demand.

    B

    RSVP uses Down Stream On Demand.

    C

    LDP uses Down Stream Unsolicited.

    D

    RSVP uses Down Stream Unsolicited.


    正确答案: B,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which tow statements are most correct regarding opt-in models?()
    A

    A based opt-in model uses virtualized identifiers

    B

    A based opt-in model uses hardware values as identifiers

    C

    A logical server opt-in model uses virtualized identifiers

    D

    A logical server opt-in model uses hardware values as identifiers


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
    A

    MPLS TE supports admission control

    B

    MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path

    C

    MPLS TE uses BGP extension to advertise link attributes

    D

    MPLS TE provides protection capability

    E

    MPLS TE uses RSVP to establish LSP


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
    A

    Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.

    B

    Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.

    C

    Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.

    D

    Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.

    E

    ISDN BRIs implement channel-associated signaling.


    正确答案: D,E
    解析: 暂无解析

  • 第13题:

    Which tow statements are most correct regarding opt-in models?()

    • A、A based opt-in model uses virtualized identifiers
    • B、A based opt-in model uses hardware values as identifiers
    • C、A logical server opt-in model uses virtualized identifiers
    • D、A logical server opt-in model uses hardware values as identifiers

    正确答案:B,C

  • 第14题:

    Which two statements are true about RSVP and the InServ QoS model?()

    • A、a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol
    • B、RSVP uses DSCP to signal QoS requirements to routers 
    • C、RSVP is a routing protocol
    • D、RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455
    • E、RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic
    • F、the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet

    正确答案:D,E

  • 第15题:

    Which statement is true about IP telephony calls?()

    • A、 A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.
    • B、 The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.
    • C、 Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.
    • D、 The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

    正确答案:D

  • 第16题:

    Which of the following statements are true? ()

    • A、 RC4 is a stream cipher
    • B、 Stream ciphers require padding
    • C、 AES is a block cipher
    • D、 DES and 3DES are stream ciphers
    • E、 AES is a stream cipher
    • F、 AES, DES, and 3DES can be used as HMAC algorithms

    正确答案:A,C

  • 第17题:

    It is important to note that from the core company’s perspective, the supply chain includes (), upstream supplier and down stream customers.

    • A、Internal functions
    • B、External functions
    • C、Information systems
    • D、Physical distribution

    正确答案:A

  • 第18题:

    Using Job Scheduling Console, how can the external successor chain  be viewed when a job needs to be canceled?()

    • A、 using the Hyperbolic Viewer
    • B、 opening the Impact view and displaying the successors
    • C、 opening the Job Stream Instance editor for its Job Stream Instance
    • D、 opening the Dependencies window and drilling down to the successors

    正确答案:B

  • 第19题:

    Which two statements are true about encrypting RMAN backup?() (Choose two.)

    • A、The transparent encryption of backups uses the encryption wallet
    • B、The database uses the same encryption key for every encrypted backup
    • C、The password encryption of backups only uses the password while creating and restoring backup
    • D、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

    正确答案:A,C

  • 第20题:

    多选题
    Which two statements are true about RSVP and the InServ QoS model?()
    A

    a drawback of implementing RSVP is the requirement to migrate to a supporting routing protocol

    B

    RSVP uses DSCP to signal QoS requirements to routers

    C

    RSVP is a routing protocol

    D

    RSVP is an IP protocol that uses IP protocol ID 46, and TCP/UDP ports 3455

    E

    RSVP specifically provides a level of service for rate-sensitive and delay-sensitive traffic

    F

    the flow-based approach of RSVP is ideal for large, scalable implementations such as the public internet


    正确答案: D,F
    解析: 暂无解析

  • 第21题:

    单选题
    Using Job Scheduling Console, how can the external successor chain  be viewed when a job needs to be canceled?()
    A

     using the Hyperbolic Viewer

    B

     opening the Impact view and displaying the successors

    C

     opening the Job Stream Instance editor for its Job Stream Instance

    D

     opening the Dependencies window and drilling down to the successors


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)
    A

    Ordered Control

    B

    Independent Control

    C

    Down Stream Unsolicited

    D

    Liberal Label Management

    E

    Down Stream On Demand


    正确答案: E,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are three security problems with Wi-Fi Protected Access (WPA)?()
    A

    WPA is based on the outdated IEEE 802.11i standard.

    B

    WPA uses RSN,which uses the same base encryption algorithm as RC4.

    C

    WPA requires a hardware upgrade that may not be supported by all vendors.

    D

    WPA uses TKIP,which uses the same base encryption algorithm as WEP.

    E

    WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

    F

    WPA is susceptible to a security weakness when preshared keys are used.


    正确答案: B,A
    解析: 暂无解析