网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
To protect against first-hop router failure, four protocols were developed to ensure IP routing  redundancy.  Which of the following are they?()
A

HSRP

B

IRDP

C

ICMP

D

VRRP

E

MSTP

F

GLBP


参考答案

参考解析
解析: 暂无解析
更多 “多选题To protect against first-hop router failure, four protocols were developed to ensure IP routing  redundancy.  Which of the following are they?()AHSRPBIRDPCICMPDVRRPEMSTPFGLBP” 相关考题
考题 We need more food to protect us ________ the famine.A. outB. offC. toD. against

考题 Drinking tea may help to protect against heart disease, stroke, diabetes and certain cancers.(翻译)

考题 Which two authentication protocols can be configured for RIP on an ERX Edge Router? () A.AB.BC.CD.D

考题 Which two services protect the ERX Edge Router from unauthorized CLI logins?() A.AB.BC.CD.D

考题 The primary reason for placing covers over storage batteries is to ______.A.Prevent the accumulation of explosive gasesB.Protect the hull from leaking electrolyteC.Prevent movement of the battery in rough watersD.Protect against accidental shorting across terminals

考题 Exercise will possibly protect against heart attacks.A:usually B:roughly C:probably D:generally

考题 A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above

考题 Which of the following statements is correct regarding PIM Sparse Mode operations?()A、It does not support all underlying unicast routing protocols like GBPB、It supports shared trees only assuming all hosts want the multicast trafficC、Receivers are registered with RP by their first-hop routerD、Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)E、From the RP,traffic flows down a Source Tree to each receiver

考题 Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

考题 Which of the following protocols enables a group of routers to form a single virtual router, and then  use the real IP address of a router as the gateway address, as defined in RFC 2338?()A、 Proxy ARPB、 HSRPC、 IRDPD、 VRRPE、 GLBP

考题 You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()A、 GLBPB、 ICMPC、 MSTPD、 HSRPE、 VRRPF、 NHRP

考题 What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks

考题 A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How can you accomplish this task,using the fewest physical interfaces and without decreasing network performance?()A、Add two more FastEthernet interfaces.B、Add a second router to handle the vlan traffic.C、Use a hub to connect the four vlans with a FastEthernet interface on router.D、Implement a router-on-a-stick configuration.

考题 Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

考题 Which of the following statements about authentication responses and conditions is true?()(Choose two.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.

考题 To protect against first-hop router failure, four protocols were developed to ensure IP routing  redundancy.  Which of the following are they?()A、 HSRPB、 IRDPC、 ICMPD、 VRRPE、 MSTPF、 GLBP

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

考题 多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router

考题 单选题Which of the following statements is correct regarding PIM Sparse Mode operations?()A It does not support all underlying unicast routing protocols like GBPB It supports shared trees only assuming all hosts want the multicast trafficC Receivers are registered with RP by their first-hop routerD Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)E From the RP,traffic flows down a Source Tree to each receiver

考题 单选题A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How canyou accomplish this task,using the fewest physical interfaces and withoutdecreasing networkperformance?()A Add two more FastEthernet interfaces.B Add a second router to handle the vlan traffic.C Use a hub to connect the four vlans with a FastEthernet interface on router.D Implement a router-on-a-stick configuration.

考题 单选题You should save your work often as a()against computer failure.A sanctionB precautionC shieldD shelter

考题 多选题You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()AGLBPBICMPCMSTPDHSRPEVRRPFNHRP

考题 多选题Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router?()ASMTPBICMPCBGPDSSHERTPFBitTorrentGVTP

考题 单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A Logging detect fail-loginB Login on-failure logC Login detect login-failure logD Logging login on-failureE none of the above

考题 单选题() are mounted in pairs to protect the boiler against overpressure.A Safety valvesB Water tubesC Steam stop valvesD Blow down valves

考题 多选题Which four are components of the Cisco collaboration Architecture strategy?()AinteroperabilityBclod computingCintercompany communicationsDdedicated networkingEvideoFenterprise social networkingGcovergence protocols

考题 单选题You are configuring a new BGP neighbor and want to view the configuration of interface ge- 0/0/0.42.Which command do you use to achieve this result?()A [edit protocols bgp group external] user@router# set interfaces ge-0/0/0.42B [edit protocols bgp group external] user@router# edit show interfaces ge-0/0/0.42C [edit protocols bgp group external] user@router# top show interfaces ge-0/0/0.42D [edit protocols bgp group external] user@router# show interfaces ge-0/0/0.42