网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
To protect against first-hop router failure, four protocols were developed to ensure IP routing redundancy. Which of the following are they?()
A
HSRP
B
IRDP
C
ICMP
D
VRRP
E
MSTP
F
GLBP
参考答案
参考解析
解析:
暂无解析
更多 “多选题To protect against first-hop router failure, four protocols were developed to ensure IP routing redundancy. Which of the following are they?()AHSRPBIRDPCICMPDVRRPEMSTPFGLBP” 相关考题
考题
Drinking tea may help to protect against heart disease, stroke, diabetes and certain cancers.(翻译)
考题
Which two authentication protocols can be configured for RIP on an ERX Edge Router? ()
A.AB.BC.CD.D
考题
The primary reason for placing covers over storage batteries is to ______.A.Prevent the accumulation of explosive gasesB.Protect the hull from leaking electrolyteC.Prevent movement of the battery in rough watersD.Protect against accidental shorting across terminals
考题
Exercise will possibly protect against heart attacks.A:usually
B:roughly
C:probably
D:generally
考题
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above
考题
Which of the following statements is correct regarding PIM Sparse Mode operations?()A、It does not support all underlying unicast routing protocols like GBPB、It supports shared trees only assuming all hosts want the multicast trafficC、Receivers are registered with RP by their first-hop routerD、Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)E、From the RP,traffic flows down a Source Tree to each receiver
考题
Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
考题
Which of the following protocols enables a group of routers to form a single virtual router, and then use the real IP address of a router as the gateway address, as defined in RFC 2338?()A、 Proxy ARPB、 HSRPC、 IRDPD、 VRRPE、 GLBP
考题
You need to design router redundancy on the Company network. Which three protocols could be chosen for IP routing redundancy to protect against first-hop router failure?()A、 GLBPB、 ICMPC、 MSTPD、 HSRPE、 VRRPF、 NHRP
考题
What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks
考题
A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How can you accomplish this task,using the fewest physical interfaces and without decreasing network performance?()A、Add two more FastEthernet interfaces.B、Add a second router to handle the vlan traffic.C、Use a hub to connect the four vlans with a FastEthernet interface on router.D、Implement a router-on-a-stick configuration.
考题
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
考题
Which of the following statements about authentication responses and conditions is true?()(Choose two.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
考题
To protect against first-hop router failure, four protocols were developed to ensure IP routing redundancy. Which of the following are they?()A、 HSRPB、 IRDPC、 ICMPD、 VRRPE、 MSTPF、 GLBP
考题
Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP
考题
多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router
考题
单选题Which of the following statements is correct regarding PIM Sparse Mode operations?()A
It does not support all underlying unicast routing protocols like GBPB
It supports shared trees only assuming all hosts want the multicast trafficC
Receivers are registered with RP by their first-hop routerD
Receivers are joinedto the Shared Tree(rooted the rp )by their local Designated Router(DR)E
From the RP,traffic flows down a Source Tree to each receiver
考题
单选题A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How canyou accomplish this task,using the fewest physical interfaces and withoutdecreasing networkperformance?()A
Add two more FastEthernet interfaces.B
Add a second router to handle the vlan traffic.C
Use a hub to connect the four vlans with a FastEthernet interface on router.D
Implement a router-on-a-stick configuration.
考题
单选题You should save your work often as a()against computer failure.A
sanctionB
precautionC
shieldD
shelter
考题
多选题You need to design router redundancy on the Company network. Which three protocols could be chosen for IP routing redundancy to protect against first-hop router failure?()AGLBPBICMPCMSTPDHSRPEVRRPFNHRP
考题
多选题Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router?()ASMTPBICMPCBGPDSSHERTPFBitTorrentGVTP
考题
单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A
Logging detect fail-loginB
Login on-failure logC
Login detect login-failure logD
Logging login on-failureE
none of the above
考题
单选题() are mounted in pairs to protect the boiler against overpressure.A
Safety valvesB
Water tubesC
Steam stop valvesD
Blow down valves
考题
多选题Which four are components of the Cisco collaboration Architecture strategy?()AinteroperabilityBclod computingCintercompany communicationsDdedicated networkingEvideoFenterprise social networkingGcovergence protocols
考题
单选题You are configuring a new BGP neighbor and want to view the configuration of interface ge- 0/0/0.42.Which command do you use to achieve this result?()A
[edit protocols bgp group external] user@router# set interfaces ge-0/0/0.42B
[edit protocols bgp group external] user@router# edit show interfaces ge-0/0/0.42C
[edit protocols bgp group external] user@router# top show interfaces ge-0/0/0.42D
[edit protocols bgp group external] user@router# show interfaces ge-0/0/0.42
热门标签
最新试卷