单项选择题
Which of the following descriptions about IP spoofing is correct?()
A.IP source address is forged B.IP destination address is forged C.IP TCP source port is forged D.IP TCP destination port is forged E.None of above
多项选择题 WhichmethodswouldenabletraffictobeforwardedalonganMPLSTEtunnel?()
单项选择题 WithVPLS,whichprotocolisusedforlabelexchangeandPWsignalling?()
单项选择题 WhenIPv6isdeployedbyaServiceProvidertobringonanIPv6Enterprise,whichtransitionstrategyworksthebest?()