网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()
- A、Packets entering F0/0 will be compared based on the PBR route map.
- B、Packets exiting F0/0 will be compared based on the PBR route map.
- C、IOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.
- D、IOS ignores the PBR forwarding directions when the packet matches a route map permit clause.
参考答案
更多 “Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()A、Packets entering F0/0 will be compared based on the PBR route map.B、Packets exiting F0/0 will be compared based on the PBR route map.C、IOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.D、IOS ignores the PBR forwarding directions when the packet matches a route map permit clause.” 相关考题
考题
Which two statements are true regarding routing policy processing?()
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.
考题
You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.
考题
A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()
A.In the absence of a terminating action, all routes are accepted.B.The route will be evaluated by the second term in the policy.C.The default action will be applied.D.In the absence of a termination action, all routes are rejected.
考题
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets
考题
Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?()
A. Confirm if there are other problematic route - map statements that precede divert.B. Check the access list for log hits.C. Check the routing table for 212.50.185.126.D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)
考题
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
What does RPL stand for?()A、routing primary languageB、routing policy languageC、routing police languageD、routing program languageE、routing protocol language
考题
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets
考题
A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A、In the absence of a terminating action, all routes are accepted.B、The route will be evaluated by the second term in the policy.C、The default action will be applied.D、In the absence of a termination action, all routes are rejected.
考题
What are two reasons why a route might be hidden?()A、route preferenceB、routing loopC、invalid next hopD、routing policy
考题
PassGuide has a BGP network and a BGP route of 197.22.129.0/24 that should be propagated to all of the devices. The route is currently not in any of the routing tables. The PassGuide administrator determines that an access list is the cause of the problem. The administrator changes the access list to allow this route, but the route still doesnot appear in any of the routing tables. What should be done to propagate this route()A、Use the service-policy command to adjust the QOS policy to allow the route to propagate.B、Clear the BGP session.C、Use the release BGP routing command.D、Change both the inbound and outbound policy related to this route.E、None of the other alternatives apply
考题
Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups
考题
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer
考题
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
考题
Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.
考题
our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A
The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB
Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC
Backup optimization is permanently disabledD
Backup optimization is temporarily disabled because a redundancy-based retention policy is specified
考题
单选题A company has a BGP network and a BGP route of 196.27.125.0/24 that should be propagated toall of the devices. The route is not now in any of the routing tables. The administrator determinesthat an access list is the cause of the problem. The administrator changes the access list to allowthis route, but the route still does not appear in any of the routing tables. What should be done topropagate this route?()A
Clear the BGP sessionB
Change both the inbound and outbound policy related to this routeC
Use the service-policy command to adjust the QOS policy to allow the route to propagateD
Use the release BGP routing command
考题
单选题A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A
In the absence of a terminating action, all routes are accepted.B
The route will be evaluated by the second term in the policy.C
The default action will be applied.D
In the absence of a termination action, all routes are rejected.
考题
单选题PassGuide has a BGP network and a BGP route of 197.22.129.0/24 that should be propagated to all of the devices. The route is currently not in any of the routing tables. The PassGuide administrator determines that an access list is the cause of the problem. The administrator changes the access list to allow this route, but the route still doesnot appear in any of the routing tables. What should be done to propagate this route()A
Use the service-policy command to adjust the QOS policy to allow the route to propagate.B
Clear the BGP session.C
Use the release BGP routing command.D
Change both the inbound and outbound policy related to this route.E
None of the other alternatives apply
考题
单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A
A route-based VPN generally uses less resources than a policy-based VPN.B
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
考题
单选题A policy-based IPsec VPN is ideal for which scenario?()A
when you want to conserve tunnel resourcesB
when the remote peer is a dialup or remote access clientC
when you want to configure a tunnel policy with an action of denyD
when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()A
End systemB
ProtocolC
ApplicationD
Throughput
考题
多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets
考题
多选题Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()APackets entering F0/0 will be compared based on the PBR route map.BPackets exiting F0/0 will be compared based on the PBR route map.CIOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.DIOS ignores the PBR forwarding directions when the packet matches a route map permit clause.
考题
多选题Which two statements are true regarding routing policy processing?()AThe Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.BPolicies are evaluated from right to left as displayed in the Junos OS configuration file.CPolices are evaluated based on the order in which they are applied to a routing protocol.DPolicy processing stops once the last statement in the policy is evaluated.
热门标签
最新试卷