- All Exams Instant Download
The following functions of the convergence layer are ____ .( Choose one or more )
The following functions of the convergence layer are ____ .( Choose one or more )A . owns a large number of interfaces, and for the final connected user computerB . access into the security controlC . High -speed packet-switchedD . complex routing strategies complicatedView AnswerAnswer: D
The advantages of modular network architecture include ____ .( Choose one or more )
The advantages of modular network architecture include ____ .( Choose one or more )A . taken on behalf of the traditional hierarchical network model, to facilitate planning and deploying the network.B . allowed to share data, resources and capacity among many different application functions or applications, participate in business processes.C . Yun Xu dynamically invoked...
Which of the following VPN technologies are suitable for enterprise employees to remotely access the enterprise private network through the Internet ? ( Choose one or more )
Which of the following VPN technologies are suitable for enterprise employees to remotely access the enterprise private network through the Internet ? ( Choose one or more )A . SSL VPNB . L2TP VPNC . GRE VPND . BGP/MPLS VPNView AnswerAnswer: AB
Which of the following statements about the access network is correct is _____
Which of the following statements about the access network is correct is _____A . access into generally refers to the connection between the user and the network operator of the network close to the user central officeB . Compared with backbone network, access network is often the bottleneck of network transmission speedC...
On a router perform row displa'interface tunnel explicit shown GRE tunnel interface as follows :
On a router perform row displa'interface tunnel explicit shown GRE tunnel interface as follows : <Router>displa interface Tunnel 0 Tunnelo current statle: UP Line protocol current state: UP Description: Tunnel 0 Interface T he Maximum transmit Unit is 1476 Internet Addess is 192.1.1.1/24 Primar. Encapsulation isTUNNELT aggregation ID not- et Tunnel source l0.1.11.1 destination...
Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data.
Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data.A . lP , IPXB . IPX , ...
Among the control messages defined by the MPCP protocol, the one sent by the ONU is _____ .( Choose one or more )
Among the control messages defined by the MPCP protocol, the one sent by the ONU is _____ .( Choose one or more ) A .The GATE B.Report C.Register_Req D.Register E.Register AckView AnswerAnswer: BCE Explanation: ONU message: report register-req register-ack
The advantages of the hierarchical network model include ___ .( Choose one or more )
The advantages of the hierarchical network model include ___ .( Choose one or more )A . by strong network scalabilityB . provide high network throughputC . drop low-end delayD . will be to maintain the network ofView AnswerAnswer: AD
In ADSL of PPPoE applications, when the CPE side using MSR router + ADSL interface card for networking, co side DSLAM make use IP rows on the co centralized router side ( PPPoE Server ) need to be on which interfaces PPPoE relevant The configuration ?
In ADSL of PPPoE applications, when the CPE side using MSR router + ADSL interface card for networking, co side DSLAM make use IP rows on the co centralized router side ( PPPoE Server ) need to be on which interfaces PPPoE relevant The configuration ?A . ATM interfaceB . Yi Tai Ethernet portC...
Which of the following VPN technologies are suitable for corporate employees on business trips to remotely access the corporate network through the Internet ?
Which of the following VPN technologies are suitable for corporate employees on business trips to remotely access the corporate network through the Internet ?A . BGP/MPLS VPNB . GRE VPNC . SSL VPND . VLLView AnswerAnswer: C