网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which source of routing information is preferred by default?()
- A、OSPF internal
- B、OSPF external
- C、IS-IS Level 1
- D、IS-IS Level 2
参考答案
更多 “Which source of routing information is preferred by default?()A、OSPF internalB、OSPF externalC、IS-IS Level 1D、IS-IS Level 2” 相关考题
考题
Which routing algorithm is described below?It is a mechanism in which the sending station determines the route the frame. will follow andincludes the routing information with the flame;bridges read the routing information to determineif they should forward the frame.A.Fixed RoutingB.Spanning TreeC.Source RoutingD.Frame. Forwarding
考题
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
A. routing-instanceB. zoneC. interfaceD. policyE. rule-set
考题
Which source of routing information is preferred by default?()
A. OSPF internalB. OSPF externalC. IS-IS Level 1D. IS-IS Level 2
考题
Which statement is true about import and export routing policies?()
A.Import policies concern routes received and determine which routes get put into the routing table.B.Export policies concern routes received and determine which routes get put into the routing table.C.Export policies are applied before the routing table.D.Import polices are applied after the routing table.
考题
How does route poisoning work with holddown timers to prevent routing loops?()
A. Information learned from one source is not distributed back to that source.B. Routing updates from the poisoned source are ignored until a holddown timer expires.C. Failed routes are advertised with infinite metrics.D. New routing updates are ignored until the network has converged.E. A route is marked as unavailable when its time-to-live is exceeded.
考题
利用IP数据包中的一个选项IP Source Routing来指定路由,利用可信用户对服务器进行攻击,这种攻击是()A、源路由选择欺骗(Source Routing Spoofing )B、IP欺骗(IP Spoofing)C、DNS欺骗(DNS Spoofing).D、TCP序列号欺骗
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
How does route poisoning work with holddown timers to prevent routing loops?()A、Information learned from one source is not distributed back to that source.B、Routing updates from the poisoned source are ignored until a holddown timer expires.C、Failed routes are advertised with infinite metrics.D、New routing updates are ignored until the network has converged.E、A route is marked as unavailable when its time-to-live is exceeded.
考题
Apart from interdomain multicast routing, what else is MSDP used for?()A、Source Specific Multicast and IGMPv2B、Announcing multicast sources to BGP speakersC、Anycast RPD、Intradomain multicast routing
考题
If the PFE does not have a route to the destination address of a packet, which action will be taken?()A、The PFE floods the packet out of all interfaces.B、The PFE drops the packet and sends a destination unreachable notification back to source device.C、The PFE forwards the packet to the routing engine for further processing.D、The PFE queues the packet and sends a request for a layer 3 lookup to the routing engine.
考题
You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?()A、The bypass-routing parameter is ignored when using private IP addressing.B、The telnet session will have the source IP address 10.10.10.1.C、The telnet session will connect to the neighboring device's interface ge-1/1/0.D、Return traffic for the telnet session might not arrive at interface ge-1/1/0.
考题
Which three methods of source NAT does JUNOS Software support?()A、interface-based source NATB、source NAT with address shiftingC、source NAT using static source poolD、interface-based source NAT without PATE、source NAT with address shifting and PAT
考题
Which of the following are shared distribution tree characteristics? (Choose all that apply.)()A、Memory requirements are higher for shared distribution tree than for source distribution treeB、Creates a tree from a central RP to all last-hop routersC、Uses a rendezvous pointD、An optimal path is created between each source router and each last-hop routerE、Place (S,G) entry in each router’s multicast routing tableF、Place (*,G) entry in a router’s multicast routing to table
考题
Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination
考题
Unicast Reverse Path Forwarding can perform all of these actions except which one?()A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB、check to see if any packet received at a router interface arrives on the best return pathC、combine with a configured ACLD、log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE、inspect IP packets encapsulated in tunnels, such as GRE
考题
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A、source IP address and the protocol (such as SSL,HTTPS,SSH)B、the packet Time to Live and the source IP addressC、type of service header and DSCP valueD、destination IP address
考题
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer
考题
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A
static source poolB
interface source poolC
source pool with PATD
souce pool without PAT
考题
单选题How does route poisoning work with holddown timers to prevent routing loops?()A
Information learned from one source is not distributed back to that source.B
Routing updates from the poisoned source are ignored until a holddown timer expires.C
Failed routes are advertised with infinite metrics.D
New routing updates are ignored until the network has converged.E
A route is marked as unavailable when its time-to-live is exceeded.
考题
单选题If the PFE does not have a route to the destination address of a packet, which action will be taken?()A
The PFE floods the packet out of all interfaces.B
The PFE drops the packet and sends a destination unreachable notification back to source device.C
The PFE forwards the packet to the routing engine for further processing.D
The PFE queues the packet and sends a request for a layer 3 lookup to the routing engine.
考题
单选题You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?()A
The bypass-routing parameter is ignored when using private IP addressing.B
The telnet session will have the source IP address 10.10.10.1.C
The telnet session will connect to the neighboring device's interface ge-1/1/0.D
Return traffic for the telnet session might not arrive at interface ge-1/1/0.
考题
单选题Which source of routing information is preferred by default?()A
OSPF internalB
OSPF externalC
IS-IS Level 1D
IS-IS Level 2
考题
单选题Which statement is true about import and export routing policies?()A
Import policies concern routes received and determine which routes get put into the routing table.B
Export policies concern routes received and determine which routes get put into the routing table.C
Export policies are applied before the routing table.D
Import polices are applied after the routing table.
热门标签
最新试卷