多项选择题
A.Section B.Line C.Frame D.Path E.DS1
WhichofthefollowingdescriptionsaboutIPspoofingiscorrect...
单项选择题Which of the following descriptions about IP spoofing is correct?()
A.IP source address is forged B.IP destination address is forged C.IP TCP source port is forged D.IP TCP destination port is forged E.None of above
WhichmethodswouldenabletraffictobeforwardedalonganMPLST...
多项选择题Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()
A.MP-BGP routing B.Static routing C.Policy routing D.Autoroute E.Forwarding adjacency
WithVPLS,whichprotocolisusedforlabelexchangeandPWsignal...
单项选择题With VPLS, which protocol is used for label exchange and PW signalling?()
A.MP-BGP B.LDP C.Directed LDP D.MTP E.BGP F.IGP