Which of the following statements regarding buffer overflow attacks is false?
B
On a MPLS network, switches can distribute labels. Which of the following statements regarding
label distribution control mode is true?
A
Which command is used to enable association between BFD and OSPF on all interfaces?
B
Which of the following statements regarding the VRRP master is false?
D
Which of the following are included in the full lifecycle guest management of the Agile Controller?
(Multiple Choice)
ABCD
Which of the following command is used to apply the traffic policy to an interface on an AR router?
A
A 32-bit MPLS header consists of a 20-bit label used for packet forwarding; A 3-bit EXP field that
identifies the IP packet priority; A 1-bit bottom-of-stack flag that identifies the last label; And an 8-
bitTTL field. Which statement regarding the TTL field is true?
A
In vAR application scenarios, which functions of the AR Router can be virtualized on a server?
(Multiple Choice)
ABCD
On a carrier's MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1
receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and
distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the
packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet
transmitted over the carrier network?
D
What are the common queue scheduling technologies? (Multiple Choice)
ACEF