网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement describes Reverse Route Injection (RRI)?()
A

A static route that points towards the Cisco Easy VPN server is created on the remote client.

B

A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.

C

A default route is injected into the route table of the remote client.

D

A default route is injected into the route table of the Cisco Easy VPN server.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement describes Reverse Route Injection (RRI)?()A A static route that points towards the Cisco Easy VPN server is created on the remote client.B A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C A default route is injected into the route table of the remote client.D A default route is injected into the route table of the Cisco Easy VPN server.” 相关考题
考题 Which statement is correct about the policy shown in the exhibit?() A. All routes are accepted.B. All routes are rejected.C. A 172.27.0.0/24 route will be accepted.D. A 172.27.0.0/16 route will be accepted.

考题 Assuming both paths shown in the exhibit are available, which statement is correct?() A. Traffic matching the default route will use 10.1.1.1 as the next hop.B. Traffic matching the default route will use 10.1.1.254 as the next hop.C. Traffic matching the default route will be load-balanced per packet across both next hops.D. Traffic matching the default route will be load-balanced per flow across both next hops.

考题 Which statement accurately defines the role of a Qualified Next Hop?() A.It is any alternative path for best effort traffic.B.It is the next hop of the active route to a directly attached device.C.It is the next hop for a route from a qualified protocol.D.It is an alternative next hop for a static route.

考题 When an administrator is troubleshooting a system, which of the following describes the NEXT course of action if a change does not solve the problem?() A. Establish a new theory of probable cause.B. Reverse the change.C. Implement the next logical change.D. Perform a root cause analysis.

考题 Based on the show ip route isis output on R1, which statement is true? () A. The i su 10.1.0.0/23 route is a suppressed route.B. The i su 10.1. 0.0/23 route is a summary route.C. The i su 10.1.0.0/23 route is an IS - IS external route.D. The R1 IS - IS router is an ASBR.E. The R1 IS - IS router is an ABR that belongs to multiple IS - IS areas.F. The R1 IS - IS router is performing route aggregation and is suppressing the more specific 10.1.0.0/23 prefix.

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

考题 Which type of EIGRP route entry describes a feasible successor?()A、a primary route,stored in the routing tableB、a backup route,stored in the routing tableC、a backup route,stored in the topology tableD、a primary route,stored in the topology table

考题 When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

考题 Which three packet interception methods are configurable in WX devices?() (Choose three.)A、OSPFB、WCCPC、policy based routingD、route injection using RIPv1E、route injection using RIPv2

考题 Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

考题 Which statement describes Reverse Route Injection (RRI)?()A、A static route that points towards the Cisco Easy VPN server is created on the remote client.B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C、A default route is injected into the route table of the remote client.D、A default route is injected into the route table of the Cisco Easy VPN server.

考题 When an administrator is troubleshooting a system, which of the following describes the NEXT course of action if a change does not solve the problem?()A、 Establish a new theory of probable cause.B、 Reverse the change.C、 Implement the next logical change.D、 Perform a root cause analysis.

考题 Which statement accurately defines the role of a Qualified Next Hop?()A、It is any alternative path for best effort traffic.B、It is the next hop of the active route to a directly attached device.C、It is the next hop for a route from a qualified protocol.D、It is an alternative next hop for a static route.

考题 Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?()A、filterB、forwardC、next-hopD、next-interface

考题 单选题Which statement accurately defines the role of a Qualified Next Hop?()A It is any alternative path for best effort traffic.B It is the next hop of the active route to a directly attached device.C It is the next hop for a route from a qualified protocol.D It is an alternative next hop for a static route.

考题 单选题Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?()A filterB forwardC next-hopD next-interface

考题 单选题When an administrator is troubleshooting a system, which of the following describes the NEXT course of action if a change does not solve the problem?()A  Establish a new theory of probable cause.B  Reverse the change.C  Implement the next logical change.D  Perform a root cause analysis.

考题 单选题Which statement describes the purpose of BGP route damping?()A Avoid interface bandwidth saturation.B Drop BGP routes when the routing-table becomes full.C Remove unnecessary route attributes when not in use.D Limit the effects of a flaping interface on route removal and readvertisement.

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A  RADIUS or LDAPB  an internal router running EIGRPC  Reverse Route Injection and OSPF or RIPv2D  the VPN appliance to be deployed in line with the firewall

考题 单选题A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()A Acquire locks on table queried B Generate redo for statement C Fetch data from disk into memory D Write changes to disk

考题 单选题The amount of fuel delivered for each cycle must be in accordance with the engine load, and the same quantity of fuel must be delivered to each cylinder for each power stroke at that load.Which of the following statements describes this requirement?()A Proper timingB Accurate meteringC Suitable injection rateD Suitable atomization rate

考题 单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 单选题Which statement describes the rule of split horizon?()A Only routers can split boundaries (horizons) between concentric networks.B All distance vector protocols require fall back routers that may cause momentary loops as the topology changes.C Networks can only remain fully converged if all information about routers is sent out all active interfaces.D Information about a route should not be sent back in the direction from which the original update come.E Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary.

考题 单选题Which statement best describes OSPF external LSAs (type 5)?()A OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.B External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.C Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.D External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area

考题 单选题Which type of EIGRP route entry describes a fesible successor?()A a primary route,stored in the routing tableB a backup route,stored in the routingt ableC a backup route,stored in the topology tableD A primary route,stored in the topology table

考题 单选题Which statement correctly describes IPsec VPN backup technology?()A The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD The cypto isakmp keepalive command is used to configure stateless failover