单选题Unicast Reverse Path Forwarding can perform all of these actions except which one?()Aexamine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedBcheck to see if any packet received at a router interface arrives on the best return pathCcombine with a configured ACLDlog its events,if you specify the logging options for the ACL entries used by the unicast rpf commandEinspect IP packets encapsulated in tunnels, such as GRE

单选题
Unicast Reverse Path Forwarding can perform all of these actions except which one?()
A

examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were received

B

check to see if any packet received at a router interface arrives on the best return path

C

combine with a configured ACL

D

log its events,if you specify the logging options for the ACL entries used by the unicast rpf command

E

inspect IP packets encapsulated in tunnels, such as GRE


参考解析

解析: 暂无解析

相关考题:

Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?() A. ip sa-validateB. ip split-horizonC. ip access-routesD. ip filter-options

What is one of the uses of MBGP routes?() A. DVMRP hold-time periodB. Rendezvous point electionC. reverse path forwarding checksD. interdomain multicast next hops

What is the purpose of unicast reverse path forwarding?() A. to validate packet receipt on interfaces where the traffic should be receivedB. to forward packets out the interfaces where the traffic should be receivedC. to forward packets out the interfaces where the traffic should be sentD. to validate packet receipt on interfaces where the traffic should be sent

Refer to the exhibit. Which two conclusions can be drawn from the debug ip igmp output?() A. The router sent an IGMP version 2 query out interface Ethernet1 at multicast address 224.0.0.1.B. Router RTA received an IGMP report version 1 from host 192.168.9.1.C. Reverse Path Forwarding (RPF) is ena bled for 192.168.9.4.D. Reverse Path Forwarding (RPF) is enabled for 224.0.1.40.E. The IP multicast groups are 224.0.0.1, 224.0.1.40, and 239.255.0.1.F. IP PIM RP mapping is static.

Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing

Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A、 The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B、 The AED is responsible for load balancing all traffic for all VLANs across the transport network.C、 The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D、 The AED is responsible for MAC address dispute contention for a given VLAN.

Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:()A、Express modeB、Strict modeC、Loose modeD、Tunnel modeE、Safe mode

Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

what is RPF( Reverse Path Forwarding )?

What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security

Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()A、 ISR can perform the functions of a multipoint control unit to facilitate voice conferencing.B、 ISR can perform the function of a call agent in the event of loss of communication with a CallManager.C、 ISR can provide XML applications to the phones.D、 ISR can provide all of the functionality of a CallManager in the event of loss ofcommunication to the CallManager.E、 ISR can act as a voice gateway to the PSTN.

For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?()A、ip verify unicast source reachable-via anyB、ip verify unicast reverse-pathC、ip verify unicast reverse-path looseD、ip verify unicast reverse-path strict

Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

Unicast Reverse Path Forwarding can perform all of these actions except which one?()A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB、check to see if any packet received at a router interface arrives on the best return pathC、combine with a configured ACLD、log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE、inspect IP packets encapsulated in tunnels, such as GRE

What is the purpose of unicast reverse path forwarding?()A、to validate packet receipt on interfaces where the traffic should be receivedB、to forward packets out the interfaces where the traffic should be receivedC、to forward packets out the interfaces where the traffic should be sentD、to validate packet receipt on interfaces where the traffic should be sent

What is one of the uses of MBGP routes?()A、DVMRP hold-time periodB、Rendezvous point electionC、reverse path forwarding checksD、interdomain multicast next hops

单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A policy based routing (PBR)B unicast reverse path forwarding (uRPF)C lock and keyACLD RFC 1918filteringE IP source routing

多选题Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:()AExpress modeBStrict modeCLoose modeDTunnel modeESafe mode

单选题For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()Aip verify unicast source reachable-via anyBip verify unicast reverse-pathCip verify unicast reverse-path looseDip verify unicast reverse-path strict

单选题Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()Aip sa-validateBip split-horizonCip access-routesDip filter-options

单选题Which of the following IOS features can prevent IP spoofing attacks?()APPP over EthernetBCisco Express forwardingCMPLS traffic EngineeringDIS-IS routingEUnicast Reverse Path Forwarding(uRPF)

单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()AIt is applied only on the input interface of a router.BIt is applied only on the output interface of a router.CIt can be configured either on the input or output interface of a router.DIt cannot be configured on a router interface.EIt is configured under any routing protocol process.

单选题Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B The AED is responsible for load balancing all traffic for all VLANs across the transport network.C The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D The AED is responsible for MAC address dispute contention for a given VLAN.

单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A Spanning tree protectB Root Guard and BPDU GuardC Unicast Reverse Path ForwardingD MAC spoof guardE Port Security

问答题what is RPF( Reverse Path Forwarding )?

多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.