网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which three options are valid ways to filter routes from a BGP peer?()
A
filter-list
B
inbound ACL
C
route-map
D
outbound ACL
E
prefix-list
F
neighbor 10.0.0.1 deny-map my-map command
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which three options are valid ways to filter routes from a BGP peer?()Afilter-listBinbound ACLCroute-mapDoutbound ACLEprefix-listFneighbor 10.0.0.1 deny-map my-map command” 相关考题
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.
考题
Whichactionoccurswhenthepolicymain-policyevaluatestheBGProute10.0.55.2/32?()[editpolicy-options]policy-statementtest{from{route-filter10.0.0.016/orlongeraccept;route-filter10.0.67.0/24orlangerreject;route-filter10.0.0.0/8orlanger;}then{metric10;communityaddno-advertise;accept;}}policy-statementmain-policy{termonly-want-certain-routes{from{policytest;}then{communityaddharry-402;accept;}}}communitynoadvertisemembersno-advertise;communityharry-402members666:402;[editprotocols]bgp{exportmain-policy;}
考题
Which three methods can you use for route discovery on a WX platform? ()(Choose three.)
A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server
考题
You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()A. Are the ASBRs trying to redistribute the external routes into a totally stubby area?B. Are the ABRs configured with stubby areas?C. Is the subnets keyword being used with the redistribution command?D. Is backbone area (area 0) contiguous?E. Is the CPU utilization of the routers high?
考题
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?()A. the OSPF routeB. the EIGRP routeC. the RIPv2 routeD. all three routesE. the OSPF and RIPv2 routes
考题
You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()A、Are the ASBRs trying to redistribute the external routes into a totally stubby area?B、Are the ABRs configured with stubby areas?C、Is the subnets keyword being used with the redistribution command?D、Is backbone area (area 0) contiguous?E、Is the CPU utilization of the routers high?
考题
Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()A、device-specificB、on-premisesC、integratedD、hybridE、virtualF、SaaS
考题
What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID
考题
Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)A、The WAN link is down.B、IPSec is enabled on the WX.C、Traceroute is enabled for compression.D、The network is configured using static routes.E、The local and remote cables are accidentally swapped.
考题
Which statement is correct about policies in the Junos OS?()A、Import policies are used to filter routes from the routing table to the forwarding table.B、Import policies are used to filter routes destined for the routing table.C、Import policies are used to filter routes being sent to neighboring devices.D、Import policies are used to filter traffic entering the device.
考题
Which three options are valid WAN connectivity methods? ()A、PPPB、WAPC、HDLCD、MPLSE、L2TPv3F、ATM
考题
Which three options are valid ways to filter routes from a BGP peer?()A、filter-listB、inbound ACLC、route-mapD、outbound ACLE、prefix-listF、neighbor 10.0.0.1 deny-map my-map command
考题
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?()A、the OSPF routeB、the EIGRP routeC、the RIPv2 routeD、all three routesE、the OSPF and RIPv2 routes
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
考题
Which statement is correct about policies in the Junos OS?()A、Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.B、Export policies are used to filter routes destined for the routing table.C、Export policies are used to filter routes being sent to neighboring devices.D、Export policies are used to filter traffic leaving the device.
考题
When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A、 Filter versionsB、 Filter loadsC、 Filter tasksD、 Filter options
考题
单选题Which statement is correct about policies in the Junos OS?()A
Import policies are used to filter routes from the routing table to the forwarding table.B
Import policies are used to filter routes destined for the routing table.C
Import policies are used to filter routes being sent to neighboring devices.D
Import policies are used to filter traffic entering the device.
考题
多选题Which three methods can you use for route discovery on a WX platform? ()(Choose three.)AEnable RIPBEnable OSPFCPeriodically poll any routerDImport routes from a TFTP server
考题
多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.
考题
多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID
考题
多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol static acceptDset protocols rip group internal export demo
考题
多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol staticDset policy-options policy-statement demo
考题
多选题Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()Adevice-specificBon-premisesCintegratedDhybridEvirtualFSaaS
考题
单选题When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A
Filter versionsB
Filter loadsC
Filter tasksD
Filter options
考题
单选题Which statement is correct about policies in the Junos OS?()A
Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.B
Export policies are used to filter routes destined for the routing table.C
Export policies are used to filter routes being sent to neighboring devices.D
Export policies are used to filter traffic leaving the device.
热门标签
最新试卷