网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()
A

Within an AS, all routers must run either BGP or IBGP.

B

An AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.

C

An AS is a group of routers under the same technical administration.

D

Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.

E

Wi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()AWithin an AS, all routers must run either BGP or IBGP.BAn AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.CAn AS is a group of routers under the same technical administration.DWithin an AS, routes learned through BGP can be redistributed using interior gateway protocols.EWi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.” 相关考题
考题 An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E

考题 Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.) A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products

考题 After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?() A. It is a globally unique IP address.B. It is a globally unique 48 bit addressC. It is provided by the manufacturer of the NIC.D. It is used as part of the IPX/SPX configuration.E. It is a logical address.

考题 Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

考题 Refer to the exhibit. Which three statements correctly describe Network Device A?() A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()A、It is a globally unique IP address.B、It is a globally unique 48 bit addressC、It is provided by the manufacturer of the NIC.D、It is used as part of the IPX/SPX configuration.E、It is a logical address.

考题 Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()A、Within an AS, all routers must run either BGP or IBGP.B、An AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.C、An AS is a group of routers under the same technical administration.D、Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.E、Wi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.

考题 Which two statements correctly describe characteristics of the PortFast feature? ()A、STP will be disabled on the port.B、PortFast can also be configured on trunk ports.C、PortFast is required to enable port-based BPDU guard.D、PortFast is used for both STP and RSTP host ports.E、PortFast is used for STP-only host ports.

考题 Which two statements correctly describe UDLD? ()A、Unidirectional link detection is achieved through monitoring STP BPDUs.B、It is recommended that it be enabled globally rather than on an individual port.C、When an error is detected, normal mode will disable a port.D、It is recommended that it be enabled in normal mode.E、It is recommended that it be used with the loop guard feature.

考题 Which three statements correctly describe the features of the I/O calibration process?()A、Only one I/O calibration process can run at a time.B、It automates the resource allocation for the Automated Maintenance Tasks.C、It improves the performance of the performance-critical sessions while running.D、It can be used to estimate the maximum number of I/Os and maximum latency time for the system.E、The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.

考题 Which three of the protocols below belong to the application layer?()A、ARPB、HTTPSC、SMTPD、CDPE、TFTPF、ICMP

考题 Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products

考题 Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

考题 Which one of the statements below correctly describes the Virtual Router Redundancy Protocol  (VRRP),  which is being used in the Company network to provide redundancy?()A、 A VRRP group has one active and one or more standby virtual routers.B、 A VRRP group has one master and one or more backup virtual routers.C、 A VRRP group has one master and one redundant virtual router.D、 None of the other alternatives apply

考题 Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values

考题 Which three statements correctly describe the functions and use of constraints? ()A、Constraints provide data independence.B、Constraints make complex queries easy.C、Constraints enforce rules at the view level.D、Constraints enforce rules at the table level.E、Constraints prevent the deletion of a table if there are dependencies.F、Constraints prevent the deletion of an index if there are dependencies.

考题 多选题Concerning the figure below, if a =b, which of the following statements must be true? (Indicate all such statements.)Ac=dBl and k are parallelCm and l are perpendicular

考题 多选题Which three of the protocols below belong to the application layer?()AARPBHTTPSCSMTPDCDPETFTPFICMP

考题 多选题Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()ATroubleshooting is more complicated.BService and switch modules are underutilized.CLayer 2 adjacency is required with the servers that use this design.DLayer 3 adjacency is required with the servers that use this design.ELoad balancing will always occur across both access layer uplinks.

考题 多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.

考题 多选题Which three statements correctly describe the features of the I/O calibration process?()AOnly one I/O calibration process can run at a timeBIt automates the resource allocation for the Automated Maintenance TasksCIt improves the performance of the performance-critical sessions while runningDIt can be used to estimate the maximum number of I/Os and maximum latency time for the systemEThe latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE

考题 多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

考题 多选题Which three statements correctly describe the features of the I/O calibration process?()AOnly one I/O calibration process can run at a time.BIt automates the resource allocation for the Automated Maintenance Tasks.CIt improves the performance of the performance-critical sessions while running.DIt can be used to estimate the maximum number of I/Os and maximum latency time for the system.EThe latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.

考题 多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values

考题 多选题Which three statements correctly describe the functions and use of constraints? ()AConstraints provide data independence.BConstraints make complex queries easy.CConstraints enforce rules at the view level.DConstraints enforce rules at the table level.EConstraints prevent the deletion of a table if there are dependencies.FConstraints prevent the deletion of an index if there are dependencies.

考题 多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.

考题 多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products