What protection method is used in 4F BLSR networks?()A. Each fiber has half of its SONET capacity reserved for protection.B. Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.C. The signal is

题目
What protection method is used in 4F BLSR networks?()

A. Each fiber has half of its SONET capacity reserved for protection.

B. Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.

C. The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

D. The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


相似考题
更多“What protection method is used in 4F BLSR networks?() ”相关问题
  • 第1题:

    Why is an OC-3 2F-BLSR not feasible?()

    A. Switch times would exceed 50 ms for an OC-3 BLSR ring.

    B. An equal amount of working and protect bandwidth is required.

    C. DCC bandwidth is not large enough to handle K1/K2 processing.

    D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.


    参考答案:B

  • 第2题:

    What are three advantages of VLANs?()

    • A、VLANs establish broadcast domains in switched networks.
    • B、VLANs utilize packet filtering to enhance network security.
    • C、VLANs provide a method of conserving IP addresses in large networks.
    • D、VLANs provide a low-latency internet working alternative to routed networks.
    • E、VLANs allow access to network services based on department, not physical location.
    • F、VLANs can greatly simplify adding, moving, or changing hosts on the network.

    正确答案:A,E,F

  • 第3题:

    What is the correct relative switching priority in a BLSR ring (higher to lower)?()

    • A、signal fail, signal degrade, manual switch
    • B、signal degrade, signal fail, manual switch
    • C、protection lockout, manual switch, path AIS
    • D、forced switch, manual switch, signal degrade
    • E、protection lockout, manual switch, forced switch

    正确答案:A

  • 第4题:

    What is the purpose of a network mask?()

    • A、It is used in conjunction with the wildcard mask to determine the number of hosts on a network
    • B、It is used to define which parts of the IP address are allocated to host addresses and network prefixes
    • C、It is used to hide subnets from external networks by masking the subnets with NAT
    • D、It is used to differentiate a network as a classful network or a classless network

    正确答案:B

  • 第5题:

    How do you define the authentication method that will be used with AAA?()

    • A、With the method aaa command
    • B、With the method command
    • C、With a method list
    • D、With a method statement

    正确答案:C

  • 第6题:

    What protection method is used in 4F MS-SPRing networks?()

    • A、 Each fiber has half of its capacity reserved for protection.
    • B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.
    • C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.
    • D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

    正确答案:B

  • 第7题:

    单选题
    Which option describes the incorrect usage of the Label Distribution method?()
    A

    LDP is primarily used in internal networks of MPLS-VPN providers.

    B

    MP-BGP is used for label distribution for VPN customer routes.

    C

    Directed LDP is used for label distribution in L2-VPN Attachement Circuits.

    D

    MP-BGP is used for label distribution in MPLS Traffic Engineered networks.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Why is an OC-3 2F-BLSR not feasible?()
    A

    Switch times would exceed 50 ms for an OC-3 BLSR ring.

    B

    An equal amount of working and protect bandwidth is required.

    C

    DCC bandwidth is not large enough to handle K1/K2 processing.

    D

    There is not enough bandwidth in an OC-3 ring to justify BLSR protection.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()
    A

     sendmail -bi

    B

     yes >/dev/kmem

    C

     emulate errlog entry

    D

     reducevg vgname hdisk#


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
    A

    GRE tunnels

    B

    automatic 6 to 4 tunnels

    C

    ISATAP tunnels

    D

    manual tunnels (RFC 2893)


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    How do you define the authentication method that will be used with AAA?()
    A

    With the method aaa command

    B

    With the method command

    C

    With a method list

    D

    With a method statement


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    What are three advantages of VLANs?()
    A

    VLANs establish broadcast domains in switched networks.

    B

    VLANs utilize packet filtering to enhance network security.

    C

    VLANs provide a method of conserving IP addresses in large networks.

    D

    VLANs provide a low-latency internet working alternative to routed networks.

    E

    VLANs allow access to network services based on department, not physical location.

    F

    VLANs can greatly simplify adding, moving, or changing hosts on the network.


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()

    A. PPMN with BLSR rings

    B. PPMN with UPSR rings

    C. 1:N protection on all core circuits

    D. multi-ring interconnect with BLSR rings


    参考答案:B

  • 第14题:

    Which option describes the incorrect usage of the Label Distribution method?()

    • A、LDP is primarily used in internal networks of MPLS-VPN providers.
    • B、MP-BGP is used for label distribution for VPN customer routes.
    • C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.
    • D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

    正确答案:D

  • 第15题:

    What is true regarding Autonomous Systems (AS )?()

    • A、AS numbers are assigned by the IANA
    • B、AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring AS
    • C、In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the control
    • D、All of the Above

    正确答案:D

  • 第16题:

    A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()  

    • A、 sendmail -bi
    • B、 yes >/dev/kmem
    • C、 emulate errlog entry
    • D、 reducevg vgname hdisk#

    正确答案:C

  • 第17题:

    In a switched LAN network, what is the Spanning-Tree algorithm used for?()

    • A、It is used to provide a mechanism for routing updates in switched environments.
    • B、It is used to prevent routing loops in networks with redundant routes.
    • C、It is used to prevent switching loops in networks with redundant switched routes.
    • D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.
    • E、It is used to segment a network into multiple collision domains.
    • F、None of the above.
    • G、All of the above are functions of STP.

    正确答案:C

  • 第18题:

    单选题
    What protection method is used in 4F MS-SPRing networks?()
    A

     Each fiber has half of its capacity reserved for protection.

    B

     Two fibers carry their full capacities while the other two fibers are reserved for protection.

    C

     The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

    D

     The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
    A

    Traffic is switched from the first node receiving the AIS indication.

    B

    Traffic is switched from the far side of the failure, allowing handshaking to occur.

    C

    UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.

    D

    UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    What is used to segment larger networks into smaller networks?()
    A

    supernet masks

    B

    subnet masks

    C

    wildcard masks

    D

    route filtering


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    What is true regarding Autonomous Systems (AS )?()
    A

    AS numbers are assigned by the IANA

    B

    AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring AS

    C

    In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the control

    D

    All of the Above


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    What teaching method is used by the teacher if much of his/her class time is spent on drilling sentence patterns followed by exercises like repetition, memorization, mimicry, etc?
    A

    The Natural Approach.

    B

    The Communicative Approach.

    C

    The Audio-lingual Method.

    D

    The Grammar-translation Method.


    正确答案: A
    解析:

  • 第23题:

    单选题
    What protection method is used in 4F BLSR networks?()
    A

    Each fiber has half of its SONET capacity reserved for protection.

    B

    Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.

    C

    The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

    D

    The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used in conjunction with the wildcard mask to determine the number of hosts on a network

    B

    It is used to define which parts of the IP address are allocated to host addresses and network prefixes

    C

    It is used to hide subnets from external networks by masking the subnets with NAT

    D

    It is used to differentiate a network as a classful network or a classless network


    正确答案: B
    解析: 暂无解析