A.Register
B.Register-Stop
C.Join/Prune
D.Reject
E.Register-Prune
F.Register-Join
您可能感興趣的試卷
你可能感興趣的試題
A.router-id 1.2.3.4
B.router-id 2011::1
C.router-id Loopback0
D.router-id FF02::5
A.filter-list
B.inbound ACL
C.route-map
D.outbound ACL
E.prefix-list
F.neighbor 10.0.0.1 deny-map my-map command
A.configuring EIGRP stubs
B.configuring a second EIGRP AS and redistributing
C.configuring summary addresses
D.configuring an offset-list
E.configuring a prefix-list
F.configuring unicast neighbors
A.It will fragment the packet at Layer 2.
B.It will fragment the packet at Layer 3.
C.It will drop the packet and send an ICMPv6 message "packet too big" back to the source.
D.It will drop the packet.
A.ldp explicit-null
B.mpls forwarding explicit-null
C.mpls ldp advertise-labels explicit null
D.mpls ldp explicit-null
最新試題
Which three protocols or applications should be placed in a class that is configured with WRED?()
Which of these statements about penultimate hop popping are true?()
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()
Which three options are valid ways to filter routes from a BGP peer?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()