网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A

all interfaces in the path toward the destination

B

all networks in the path toward the destination

C

adjacent next hop router in the path toward the destination

D

all routers in the path toward the destination

E

all interfaces through which the packets can be routed

F

type of service and precedence in the IP packets


参考答案

参考解析
解析: 暂无解析
更多 “多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets” 相关考题
考题 When importing or exporting routing information using routing policy, the import or export is always done from which point of view?() A. routing tableB. forwarding tableC. routing protocolD. neighbor or peer

考题 Which two statements are true regarding routing policy processing?() A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.

考题 You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.

考题 When configured. MPLS can increase routing redundancy by providing which of the following network topology types?() A.BusB.MeshC.MultipathD.Ring

考题 When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

考题 Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?() A. Confirm if there are other problematic route - map statements that precede divert.B. Check the access list for log hits.C. Check the routing table for 212.50.185.126.D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)

考题 Which two routing protocols require a metric to be configured when redistributing routes from other protocols?() A. RIPB. BGPC. IS - ISD. OSPFE. EIGRP

考题 You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.

考题 Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing

考题 When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

考题 A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN

考题 A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

考题 Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A、The tunnel that is not configured with the policy-class command acts as the defaultB、EXP selection is between multiple tunnels to the same destinationC、There is no requirement for IGP extensionsD、Tunnels are configured using the policy-class command and carry multiple EXP valuesE、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

考题 When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring

考题 When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer

考题 Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.

考题 单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A  policy based routing (PBR)B  unicast reverse path forwarding (uRPF)C  lock and keyACLD  RFC 1918filteringE  IP source routing

考题 多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

考题 单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

考题 单选题When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A routing tableB forwarding tableC routing protocolD neighbor or peer

考题 单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()A  The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabledB  Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC  Backup optimization is permanently disabledD  Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

考题 单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()A It is a route to be used when the routing protocol fails.B It is a route configured by an ISP that sends traffic into a corporate network.C It is a route used when a packet is destined for a remote network that is not listed in the routing table.D It is a route manually configured for a specific remote network for which a routing protocol is not configured.E It is used to send traffic to a stub network.

考题 单选题A policy-based IPsec VPN is ideal for which scenario?()A when you want to conserve tunnel resourcesB when the remote peer is a dialup or remote access clientC when you want to configure a tunnel policy with an action of denyD when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()A End systemB ProtocolC ApplicationD Throughput

考题 多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

考题 多选题Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()APackets entering F0/0 will be compared based on the PBR route map.BPackets exiting F0/0 will be compared based on the PBR route map.CIOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.DIOS ignores the PBR forwarding directions when the packet matches a route map permit clause.

考题 多选题Which two statements are true regarding routing policy processing?()AThe Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.BPolicies are evaluated from right to left as displayed in the Junos OS configuration file.CPolices are evaluated based on the order in which they are applied to a routing protocol.DPolicy processing stops once the last statement in the policy is evaluated.