Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

A. BGP
B. OSPF
C. IS-IS
D. MPLS


Answer: D. MPLS

Computer Science & Information Technology

You might also like to view...

If you receive a file from someone else, which you then modify and use, the original author's name ________

A) is saved in a different file B) is replaced by a search engine C) remains with the file D) is replaced by your name

Computer Science & Information Technology

In accordance with the Fair Credit Reporting Act ("FCRA"), what is an investigative consumer report?

A. Factual information on a consumer's credit record obtained directly from a creditor of the consumer or from a consumer reporting agency B. A consumer report containing information about a consumer's past employment C. A consumer report containing information on a consumer's character, general reputation, personal characteristics, or mode of living that is obtained through personal interviews D. A report generated by a third-party investigator relating to a consumer's health

Computer Science & Information Technology

When applied to text strings, the term ____________________ refers to the act of extracting characters or substrings from a larger string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the figure above, the number 1 refers to the ____________________ tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology