网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which three IP multicast address related statements are true? (Choose three.) () 

  • A、Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted  with Time to Live (TTL) greater than 1.
  • B、Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.
  • C、Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and  IGMPv3.
  • D、Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1  and 238.1.1.1 could not be used together.
  • E、Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA
  • F、The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in  purpose to RFC 1918 private unicast addresses.

参考答案

更多 “Which three IP multicast address related statements are true? (Choose three.) () A、Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted  with Time to Live (TTL) greater than 1.B、Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.C、Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and  IGMPv3.D、Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1  and 238.1.1.1 could not be used together.E、Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANAF、The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in  purpose to RFC 1918 private unicast addresses.” 相关考题
考题 Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.) A. MIME patternB. file extensionC. IP spoofingD. POP3E. protocol command

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication

考题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.) A. IP protocolB. IP time-to-liveC. source and destination IP addressD. source and destination MAC addressE. source and destination TCP/UDP port

考题 Which three can be specified within an RSVP session attribute object?() (Choose three.) A. hold priorityB. setup priorityC. FEC IP addressD. resource availabilityE. local protection option

考题 Which three properties or behaviors of an IP interface are defined by a profile? ()(Choose three.) A. IP access routesB. MTU size of the interfaceC. number of PPPoE sessionD. using CHAP for authenticationE. assigning the interface to a virtual router

考题 Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? () A. IP telephonyB. securityC. IP multicastingD. QoS

考题 Which three of these can be a forwarding equivalence class? ()A、IPsec tunnelB、routing equivalence pathsC、traffic engineering tunnelD、bridge or switch instanceE、groups of IP addresses

考题 Which three pieces of information are contained in a Service Profile for related vNICs?()A、MAC addressB、MTUC、IP addressD、VLAN connectivity informationE、UUID

考题 Which three of the following are licensed Cisco CRS 4.0 software products?()A、IPCC Express (Standard, Enhanced, or Premium) B、IP IVR C、Auto Attendant D、IPCC Express Cisco Agent Desktop E、IP Queue ManagerF、IP IVR Peripheral Gateway (PG)

考题 The cluster IP address of the UCS Fabric interconnects is used to access which three entities? ()A、CMCB、CLIC、APID、VSME、UI

考题 Which three properties or behaviors of an IP interface are defined by a profile? ()(Choose three.)A、IP access routesB、MTU size of the interfaceC、number of PPPoE sessionD、using CHAP for authenticationE、assigning the interface to a virtual router

考题 Which three attributes are carried in a source active message?()A、NLRI informationB、IP address of originating RPC、address of multicast sourceD、all active RPs in the local domainE、group address to which the source is sending

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? ()A、IP telephonyB、securityC、IP multicastingD、QoS

考题 Which three components are part of the Intelligent Network Services provided by the Cisco AVVIDframework? ()A、 IP telephonyB、 securityC、 IP multicastingD、 QoS

考题 In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

考题 Which three can be specified within an RSVP session attribute object?() (Choose three.)A、hold priorityB、setup priorityC、FEC IP addressD、resource availabilityE、local protection option

考题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)A、MIME patternB、file extensionC、IP spoofingD、POP3E、protocol command

考题 多选题Which three properties or behaviors of an IP interface are defined by a profile? ()(Choose three.)AIP access routesBMTU size of the interfaceCnumber of PPPoE sessionDusing CHAP for authenticationEassigning the interface to a virtual router

考题 多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

考题 多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

考题 多选题The cluster IP address of the UCS Fabric interconnects is used to access which three entities? ()ACMCBCLICAPIDVSMEUI

考题 多选题What are three methods that may be use d to allow a switch to determine which ports to forward IP multicast messages to?()AIGMPBIGMP snoopingCPIMDCGMPEstatic assignmentFCDP

考题 多选题Which three of these can be a forwarding equivalence class? ()AIPsec tunnelBrouting equivalence pathsCtraffic engineering tunnelDbridge or switch instanceEgroups of IP addresses

考题 多选题Which three of the following protocols will be forwarded to a host specified by the ip helper - address interface configuration command if the configuration has not been modified by the ip forward - protocol udp global con figuration command?()ABOOTPBTFTPCARPDDNSEproxy - ARPFFTP

考题 多选题Which three can be specified within an RSVP session attribute object?() (Choose three.)Ahold priorityBsetup priorityCFEC IP addressDresource availabilityElocal protection option