网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two steps are required for a Kompella Layer 2 VPN?()
A

Configure a site id for each ce.

B

Configure a VPN label for each VPN.

C

Configure a MP-bgp session to each pe.

D

Configure an Extended LDP Session to each pe.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a siteid for each ce.BConfigure a VPN label for each VPN.CConfigure a MP-bgp session to each pe.DConfigure an Extended LDP Session to each pe.” 相关考题
考题 PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?() A. an LSP for each local CE deviceB. an LSP for each remote PE deviceC. an LSP for each remote CE deviceD. an LSP for each CE facing interface

考题 哪一项不是pre-launch LTE drive test?() A.Each session started from EMM-DEREGISTERED stateB.Each session started from RRC-IDLE EMM-REGISTERED stateC.Each session started from RRC-CONNECTED stateD.Each session started from pdp-connect-request

考题 哪一项不是pre-launch LTE drive test?()A、Each session started from EMM-DEREGISTERED stateB、Each session started from RRC-IDLE EMM-REGISTERED stateC、Each session started from RRC-CONNECTED stateD、Each session started from pdp-connect-request

考题 You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol statusfor the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors.Which layer of the OSI model does the problem most likely exist?()A、PhysicalB、SessionC、ApplicationD、Data-LinkE、Network

考题 Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

考题 What are the "bound IP addresses" used for in LDP?()A、For each such address and mask /32, one label binding is created.B、As the TCP endpoint, IP addresses are used by the LDP session.C、These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.D、These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 

考题 Company.com wants to put two Micro-Partitions on a p5-570 and attach to a SAN. What is the best LPAR configuration to maximize SAN availability using four Host Bus Adapters (HBAs)?()A、Two HBAs assigned to each redundant VIOS which provides VSCSI access to LUNsB、Two HBAs assigned to each LPAR with each LPAR owning HBAs on the same PCI bussesC、Two HBAs assigned to each LPAR with each LPAR owning HBAs on separate PCI bussesD、One HBA assigned to each LPAR and two HBAs assigned to a VIOS providing VSCSI access to LUNs

考题 PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface

考题 Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.

考题 Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

考题 Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A、Port mirroringB、VPNC、TrunkingD、Port authentication

考题 In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A、IP address and IP label of each service and boot interface in the clusterB、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

考题 Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a site ID for each CEB、Configure a VPN label for each VPNC、Configure a MP-BGP session to each PED、Configure an Extended LDP Session to each PE

考题 Your company has 10 offices.  The offices connect to the Internet by using a WAN link.  The offices connect to each other by using a VPN connection.  An Active Directory site exists for each office. You plan to deploy Exchange Server 2010. Each site will contain two Exchange Server 2010 servers.  You need to recommend the placement of domain controllers and global catalog servers to meet thefollowing requirements: .Minimize the number of domain controllers .Must be able to deliver e-mail messages between users of the same office, if a domain controller and aWAN link fail simultaneously What should you recommend?()A、In each site, install two global catalog servers.B、In each site, install two domain controllers. Enable Universal Group Membership caching for each site.C、In each site, install two domain controllers. Create a publishing point for an offline address list on one Exchange server in each site.D、In each site, install one domain controller that is configured as a global catalog server.Enable Universal Group Membership caching for each site.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

考题 You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()A、 A single forest with one tree, and one domainB、 A single forest with one tree two domainC、 A single forest with two trees, each with a single domainD、 Two forests, each with a single tree and a single domainE、 Two forests, each with two trees, with a single domain in each tree.

考题 单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do?()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in Sydney.D Configure a dial-up server in each branch office.

考题 单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()A Configure a demand-dial router.B Create multiple Active Directory site links.C Configure a VPN connection between each branch office.D Install an Internet Authentication Service (IAS) server in each branch office.

考题 多选题Which two statements accurately describe an IBGP peering session?() (Choose two.)APeers are statically defined.BPeers exist within the same AS.CPeers must be directly connected to each other.DPeers advertise routes learned from other IBGP neighbors.

考题 单选题You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()A  A single forest with one tree, and one domainB  A single forest with one tree two domainC  A single forest with two trees, each with a single domainD  Two forests, each with a single tree and a single domainE  Two forests, each with two trees, with a single domain in each tree.

考题 多选题Refer to the exhibit. Which three statements correctly describe Network Device A?()AWith a network wide mask of 255.255.255.128, each interface does not require an IP address.BWith a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.CWith a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.DWith a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.EWith a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 多选题Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()AMPLS LSPBATM tunnelCGRE tunnelDIPSEC tunnelEL2TPv3 session

考题 单选题Records of garbage disposal are required to be maintained ().A until each quadrennial PSC inspectionB until the end of each voyageC for a minimum of one yearD for a minimum of two years

考题 单选题What are the "bound IP addresses" used for in LDP?()A For each such address and mask /32, one label binding is created.B As the TCP endpoint, IP addresses are used by the LDP session.C These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.D These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 

考题 多选题You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()ASelect L2TP/IPSec on each Windows Mobilebased device.BObtain and install a certificate on each Windows Mobilebased device.CConfigure the appropriate pre-shared key on each Windows Mobilebased device.DSelect Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

考题 多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a siteid for each ce.BConfigure a VPN label for each VPN.CConfigure a MP-bgp session to each pe.DConfigure an Extended LDP Session to each pe.

考题 单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.  B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.  

考题 多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE