网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()
- A、an LSP for each local CE device
- B、an LSP for each remote PE device
- C、an LSP for each remote CE device
- D、an LSP for each CE facing interface
参考答案
更多 “PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface” 相关考题
考题
关于MPLSBGPVPN(不跨域)标签的说法正确的有()A.VPN报文转发采用两层标签方式B.第一层(外层)标签在骨干网内部进行交换,指示从PE到对端PE的一条LSP,VPN报文利用这层标签,可以沿LSP到达对端PEC.第二层(内层)标签在从对端PE到达CE时使用,指示报文应被送到哪个Site,或者到达哪一个CE。对端PE根据内层标签可以找到转发报文的接口D.内层标签由LDP协议分发给LSR
考题
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()
A. an LSP for each local CE deviceB. an LSP for each remote PE deviceC. an LSP for each remote CE deviceD. an LSP for each CE facing interface
考题
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()
A. use BGP as the CE-PE routing protocolB. use OSPF as the CE-PE routing protocolC. use EIGRP as the CE-PE routing protocolD. use the SP to redistribute routes as external routes for OSPF and EIGRPE. use route redistribution at each location to ensure external routes are imported into the IGP
考题
How should arouter that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()
A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interfaceB.Configure each Frame Relay circuit as apoint-to-point line to support multicast and broadcast trafficC.Configure many sub-interfaces on the same subnetD.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces
考题
Which statement about VPLS is true?()A、All CE devices emulate a bridgeB、All provider devices emulate a bridgeC、Hierarchical VPLS reduces signaling overheadD、Each PE device emulates a bridgeE、Each CE device emulates a bridge
考题
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface
考题
Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.
考题
Which condition must be met to allow a PE router to forward VPN traffic across a LSP in a Layer 3 VPN environment?()A、The BGP next hop must be in inet.1.B、The BGP next hop must be in inet.3.C、Must have a bidirectional LSP configured.D、Must have a static route to allow an RP for connected interfaces.
考题
In a configuration with redundant supervisors, how many IP addresses are required to configure full remote access via management 0?() A、 two IP addresses, one for each supervisorB、 three IP addresses, one virtual IP and one physical IP for each supervisorC、 one IP address that is shared among supervisorsD、 none—management 0 will use the IP address from the first SVI that is created
考题
How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()A、Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.B、Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.C、Configure many sub-interfaces on the same subnet.D、Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
考题
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()A、 use BGP as the CE-PE routing protocolB、 use OSPF as the CE-PE routing protocolC、 use EIGRP as the CE-PE routing protocolD、 use the SP to redistribute routes as external routes for OSPF and EIGRPE、 use route redistribution at each location to ensure external routes are imported into the IGP
考题
At a minimum how many NICs must a machine have to host virtual machines?()A、 One NIC will support all virtual machinesB、 One for each virtual machine and one for managementC、 Three for each virtual machineD、 Two for each virtual machine and one for management
考题
Your BladeCenter customer operates multiple geographically dispersed datacenters and needs resilient remote access to servers. What is the most cost-effective solution listed below?()A、Add redundant management modulesB、Individual 1U and 2U servers equipped with Remote Support AdaptersC、Train and deploy highly skilled system administrators to each siteD、Maintain system administrators centrally and dispatch to remote sites when needed
考题
Two Label-Switched Paths called LSP A and LSP B have been configured on a router. LSP A has been configured with a hold-priority of 3. There is insufficient reservable bandwidth along the path to accomodate both LSPs reservation requirements. Which setup priority must LSP B have to pre-empt LSP A and use its bandwidth?()A、2B、3C、4D、7
考题
Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a site ID for each CEB、Configure a VPN label for each VPNC、Configure a MP-BGP session to each PED、Configure an Extended LDP Session to each PE
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices. A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet. You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices. Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office. What should you do? ()A、 Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.B、 Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.C、 Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.D、 Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.
考题
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A、Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB、Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC、Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD、Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
考题
You are the systems engineer for your company. The company has a main office in Los Angeles and two branch offices, one in Chicago and one in New York. The offices are connected to one another by dedicated T1 lines. Each office has its own local IT department and administrative staff. The company network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. All servers support firmware-based console redirection by means of the serial port. The server hardware does not support any other method of console redirection and cannot be upgraded to do so. The company is currently being reorganized. The IT departments from each branch office are being relocated to a new central data center in the Los Angeles office. Several servers from each branch office are also being relocated to the Los Angeles data center. Each branch office will retain 10 servers. A new written security policy includes the following requirements: • All servers must be remotely administered for all administrative tasks. • All servers must be administered from the Los Angeles office. • All remote administration connections must be authenticated and encrypted. Your current network configuration already adheres to the new written security policy for day-to-day server administration tasks performed on the servers. You need to plan a configuration for out-of-band management tasks for each office that meets the new security requirements. Which three actions should you take?()A、 Connect each server’s serial port to a terminal concentrator. Connect the terminal concentrator to the network.B、 Connect a second network adapter to each server. Connect the second network adapter in each server to a separate network switch. Connect the management port on the switch to a WAN port on the office router. Enable IPSec on the router.C、 Enable Routing and Remote Access on a server in each branch office, and configure it as an L2TP/IPSec VPN server. Configure a remote access policy to allow only authorized administrative staff to make a VPN connection.D、 On each server, enable the Telnet service with a startup parameter of Automatic. Configure Telnet on each server to use only NTLM authentication. Apply the Server (Request Security) IPSec policy to all servers.E、 On each server, enable Emergency Management Services console redirection and the Emergency Management Services Special Administration Console (SAC).
考题
单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A
Configure each server running Routing and Remote Access as a RADIUS Client.B
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()A
an LSP for each local CE deviceB
an LSP for each remote PE deviceC
an LSP for each remote CE deviceD
an LSP for each CE facing interface
考题
单选题In a configuration with redundant supervisors, how many IP addresses are required to configure full remote access via management 0?()A
two IP addresses, one for each supervisorB
three IP addresses, one virtual IP and one physical IP for each supervisorC
one IP address that is shared among supervisorsD
none—management 0 will use the IP address from the first SVI that is created
考题
单选题At a minimum how many NICs must a machine have to host virtual machines?()A
One NIC will support all virtual machinesB
One for each virtual machine and one for managementC
Three for each virtual machineD
Two for each virtual machine and one for management
考题
单选题Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()A
use BGP as the CE-PE routing protocolB
use OSPF as the CE-PE routing protocolC
use EIGRP as the CE-PE routing protocolD
use the SP to redistribute routes as external routes for OSPF and EIGRPE
use route redistribution at each location to ensure external routes are imported into the IGP
考题
单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A
an LSP for each local CE deviceB
an LSP for each remote PE deviceC
an LSP for each remote CE deviceD
an LSP for each CE facing interface
考题
单选题Which condition must be met to allow a PE router to forward VPN traffic across a LSP in a Layer 3 VPN environment?()A
The BGP next hop must be in inet.1.B
The BGP next hop must be in inet.3.C
Must have a bidirectional LSP configured.D
Must have a static route to allow an RP for connected interfaces.
热门标签
最新试卷