Which Of the Statements best describes VPLS ?
Answer / moparthynani
A. Neither broadcast nor multicast traffic is ever flooded
in VPLS
B. Multicast traffic is flooded but broadcast traffic is not
flooded in VPLS
C. VPLS emulates an Ethernet switch,which each EMS being
analogous to a VLAN
D. Because U-PE devices act as IEEE 802.1 devices,the VPLS
core must use STP
| Is This Answer Correct ? | 6 Yes | 4 No |
Regarding a full-mesh network and a partial-mesh network, what is the most accurate statement? A. Split Horizon will not work on a full-mesh network B. A full-mesh network is more expensive because more routers are used C. A partial-mesh network is less expensive because less virtual circuits are used D. Broadcasts are more plentiful on a partial-mesh network
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes
Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
Client traffic is being bridged trough LAN interfaces on two WLCs.Which roaming option will Keep them on the same IP Subnet ?
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link
In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network