网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()
A

The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set

B

The map prohibits the redistribution of all type 2 external OSPF routes

C

The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500

D

The map prohibits the redistribution of all external OSPF routes with tag 6 set

E

All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8

F

The map permits the redistribution of all type 1 external OSPF routes


参考答案

参考解析
解析: 暂无解析
更多 “多选题Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()AThe map prohibits the redistribution of all type 2 external OSPF routes with tag 6 setBThe map prohibits the redistribution of all type 2 external OSPF routesCThe map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500DThe map prohibits the redistribution of all external OSPF routes with tag 6 setEAll routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8FThe map permits the redistribution of all type 1 external OSPF routes” 相关考题
考题 Which three authentication options does IS-IS support?() A. MD5B. DESC. KerberosD. unauthenticatedE. simple password

考题 Refer to the exhibit. Which of the following statements is true? () A. BGP NSF awareness is enabledB. SSO for BGP NSF capability is enabledC. BGP graceful restart awareness is enabledD. 10.11.1.187 is configured as an NSF-capable BGP neighbor

考题 Refer to the exhibit. Which command would verify if PBR reacts to packets sourced from 172.16.0.0/16?() A. show ip routeB. show policy - mapC. show access - listsD. show route - map

考题 Refer to the exhibit. Two routers are connected by Frame Relay and are running OSPF bet ween them. Each router has been configured with the appropriate network statements under router ospf 1, but the routers are not forming an adjacency. Which of the following three commands could be configured on each router to correct this problem?()A. RouterC(config - if)#ip ospf network broadcast RouterD(config - if)#ip ospf network broadcastB. RouterC(config - if)#ip ospf network point - to - point RouterD(config - if)#ip ospf network point - to - pointC. RouterC(config - router)#neighbor 10.100. 100.4 RouterD(config - router)#neighbor 10.100.100.3D. RouterC(config - router)#neighbor 10.255.255.254 RouterD(config - router)#neighbor 10.255.255.253

考题 Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?() A. Confirm if there are other problematic route - map statements that precede divert.B. Check the access list for log hits.C. Check the routing table for 212.50.185.126.D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)

考题 Refer to the exhibit. What three statements are true about the IS - IS configuration?() A.The router is in area 49.0001.0002B.The router acts as a Level 1 - 2 routerC.CLNS routing is enable d for the routerD.The router has a system ID of 0003.0004E.The interfaces have a functional IS - IS configurationF.The network service access point selector (NSEL) byte has a value of 0

考题 Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?() A. The map prohibits th e redistribution of all type 2 external OSPF routes.B. All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8.C. The map prohibits the redistribution of all external OSPF routes with tag 6 set.D. Th e map permits the redistribution of all type 1 external OSPF routes.E. The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values?0000, 1000, 255, 1, and 1500.F. The map prohibits the redistribution of all ty pe 2 external OSPF routes with tag 6 set.

考题 Refer to the exhibit. Which two statements are true about the partial configuration that is provided.() A. The peer group shortens the EBGP configurationB. The peer group shortens the IBGP configurationC. All the configured neighbors are in autonomous system 100D. Three AS - path filters are applied to each BGP neighborE. Only the outgoing filters are applied to BGP updates

考题 Refer to the exhibit. Which two statements about the topologies shown are correct?() A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.

考题 Refer to the exhibit. Which recommended practice is applicable?() A. If no core layer is deployed, the design will be easier to scale.B. If no core layer is deployed, there will be fewer cabling requirements.C. If no core layer is deployed, the distribution switches should not be fully meshed.D. A dedicated campus core layer is not needed for connecting fewer than five buildings.E. A dedicated campus core layer should be deployed for connecting three or more buildings.

考题 Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

考题 Refer to the exhibit. Which three statements correctly describe Network Device A?() A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?() A.10.0.0.0B.10.0.0.254C.192.223.129.0D.192.223.129.254

考题 For the following statements, which one is the strongest symmetrical encryption algorithm?()A、AESB、3DESC、DESD、Diffie-Hellman

考题 Refer to the exhibit.   What are three of the basic components of a VoIP network?()A、software voice applicationsB、multipoint control unit (MCU)  C、gatekeeper  D、call agentE、interactive voice response (IVR) systems  F、softphones

考题 Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()A、All ports will be in a state of discarding, learning, or forwarding.B、Thirty VLANs have been configured on this switch.C、The bridge priority is lower than the default value for spanning tree.D、All interfaces that are shown are on shared media.E、All designated ports are in a forwarding state.F、The switch must be the root bridge for all VLANs on this switch.

考题 Which three authentication options does IS-IS support?()A、MD5B、DESC、KerberosD、UnauthenticatedE、Simple password

考题 Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

考题 Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 多选题Refer to the exhibit. Which two statements are correct? (Choose two.)()AAll six routes will be installed in the routing table.BTwo routes will be installed in the routing table.CFour routes will be installed in the routing table.DAll the routes were redistributed into BGP from an IGP.EAll the routes were originated by BGP with the network command.

考题 单选题Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?()A As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.B Remote access management of this switch will not be possible without configuration change.C More VLANs will need to be created for this switch.D The switch will need a different IOS code in order to support VLANs and STP.

考题 多选题Refer to the exhibit. Which three statements correctly describe Network Device A?()AWith a network wide mask of 255.255.255.128, each interface does not require an IP address.BWith a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.CWith a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.DWith a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.EWith a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 多选题Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()AA device is trusted if it correctly classifies packets.BA device is trusted if it correctly declassifies packets.CThe outermost trusted devices represent the trust boundary.DClassification and marking occur using 802.1ab QoS bits before reaching the trust boundary.ENetwork trust boundaries are automatically configured in IOS version 12.3 and later.FFor scalability, classification should be done as close to the edge as possible.

考题 多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

考题 多选题Refer to the exhibit.   What are three of the basic components of a VoIP network?()Asoftware voice applicationsBmultipoint control unit (MCU)CgatekeeperDcall agentEinteractive voice response (IVR) systemsFsoftphones

考题 单选题Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()A ip dhcp pool ClientB network 10.1.1.0 255.255.255.240C default-router 10.1.1.1D dns-server 10.2.2.2E domain-name cisco.comF option 150 ip 10.3.3.3

考题 多选题Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()ARouter A is responsible for answering ARP requests sent to the virtual IP address.BIf Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router ACIf another router were added to this GLBP group, there would be two backup AVGsDRouter B is in GLBP listen state.ERouter A alternately responds to ARP requests with different virtual MAC addresses.FRouter B will transition from blocking state to forwarding state when it becomes the AVG