多选题Which two statements about the EIGRP DUAL process are correct?()AAn EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.BAn EIGRP route will go passive if there are no successors in the EIGRP topology table.CDUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.DA feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.EThe stuck in active state is caused when the wait for the query replies have timed out.FEIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

多选题
Which two statements about the EIGRP DUAL process are correct?()
A

An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.

B

An EIGRP route will go passive  if there are no successors in the EIGRP topology table.

C

DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.

D

A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.

E

The stuck in active state is caused when the wait for the query replies have timed out.

F

EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.


参考解析

解析: 暂无解析

相关考题:

Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.) A. In the DH key exchange process, the session key is never passed across the network.B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

Which three statements about EIGRP are true?() A.EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.B.EIGRP uses a hello protocol to establish neighbor relationshipsC.EIGRP uses split horizon and reverse poisoning to avoid routing loops.D.EIGRP uses periodic updates to exchange routing informationE.EIGRP allows routers of different manufacturers to interoperateF.EIGRP supports VLSM and authentication for routing updates.G. EIGRP use a broadcast address to send routing information.

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets (Choose two.)()。 A.neighbor tableB.SPF tableC.RTP tableD.topology tableE.query tableF.DUAL table

Which two statements about EIGRP are true?()A、EIGRP supports VLSM, route summarization, and routing update authentication.B、If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.C、Passive routes are in the process of being calculated by DUAL.D、EIGRP exchanges full routing table information with neighboring routers with every update.E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

Which two statements about the EIGRP DUAL process are correct?()A、An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.B、An EIGRP route will go passive if there are no successors in the EIGRP topology table.C、DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.D、A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.E、The stuck in active state is caused when the wait for the query replies have timed out.F、EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which statements are true about EIGRP successor routes? ()A、A successor route is used by EIGRP to forward traffic to a destination.B、Successor routes are saved in the topology table to be used if the primary route fails.C、Successor routes are flagged as "active" in the routing table.D、A successor route may be backed up by a feasible successor route.E、Successor routes are stored in the neighbor table following the discovery process.

Which two statements are true regarding EIGRP?()A、Passive routes are in the process of being calculated by DUAL.B、EIGRP supports VLSM,route summarization,and routing update authentication.C、EIGRP exchanges full routing table information with neighboring routers with every update.D、If the feasible successor has a higher advertised distance than the successor route,it becomes theprimary route.E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

Which statements are true about EIGRP successor routes (Choose two.)()。A、A successor route is used by EIGRP to forward traffic to a destination.B、Successor routes are saved in the topology table to be used if the primary route fails.C、Successor routes are flagged as "active" in the routing table.D、A successor route may be backed up by a feasible successor route.E、Successor routes are stored in the neighbor table following the discovery process.

Which three statements about EIGRP are true?()A、EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.B、EIGRP uses a hello protocol to establish neighbor relationshipsC、EIGRP uses split horizon and reverse poisoning to avoid routing loops.D、EIGRP uses periodic updates to exchange routing informationE、EIGRP allows routers of different manufacturers to interoperateF、EIGRP supports VLSM and authentication for routing updates.G、EIGRP use a broadcast address to send routing information.

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets (Choose two.)()。A、neighbor tableB、SPF tableC、RTP tableD、topology tableE、query tableF、DUAL table

Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destination.B、The forwarding table contains only active routes.C、The forwarding table is used to process transit packets.D、The forwarding table is stored in compact flash.

Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destinationB、The forwarding table constains only active routesC、The forwarding table is used to process transit packetsD、The forwarding table is stored in compact flash

Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()A、In the DH key exchange process, the session key is never passed across the network.B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destination.B、The forwarding table contains only active routes.C、The forwarding table is used to process transit packets.D、The forwarding table is stored in compact flash

多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

多选题Which two statements about route redistribution when implementing OSPF are true?()ARoutes learned using any IP routing protocol can only be redistributed into non IP routing protocols.BOSPF can import routes learned using EIGRP, RIP, and IS - IS.COSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.DAt the interdomain level, OSPF cannot import routes learned using BGP.EOSPF routes can be exported into BGP.

多选题Which two statements about EIGRP are true?()AEIGRP supports VLSM, route summarization, and routing update authentication.BIf the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.CPassive routes are in the process of being calculated by DUAL.DEIGRP exchanges full routing table information with neighboring routers with every update.EA query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

多选题Which two statements about the EIGRP DUAL process are correct?()AAn EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.BAn EIGRP route will go passive if there are no successors in the EIGRP topology table.CDUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.DA feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.EThe stuck in active state is caused when the wait for the query replies have timed out.FEIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

多选题Which statements are true about EIGRP successor routes?()AA successor route is used by EIGRP to forward traffic to a destination.BSuccessor routes are saved in the topology table to be used if the primary route fails.CSuccessor routes are flagged as active in the routing table.DA successor route may be backed up by a feasible successor route.ESuccessor routes are stored in the neighbor table following the discovery process.FSuccessors are not used in EIGRP.

多选题Which three statements about EIGRP are true?()AEIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.BEIGRP uses a hello protocol to establish neighbor relationshipsCEIGRP uses split horizon and reverse poisoning to avoid routing loops.DEIGRP uses periodic updates to exchange routing informationEEIGRP allows routers of different manufacturers to interoperateFEIGRP supports VLSM and authentication for routing updates.GEIGRP use a broadcast address to send routing information.

多选题Which two statements are true regarding EIGRP?()APassive routes are in the process of being calculated by DUAL.BEIGRP supports VLSM, route summarization, and routing update authentication.CEIGRP exchanges full routing table information with neighboring routers with every update.DIf the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.EA query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

多选题Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()AThe i nterface used by one router to connect to the other router is passive in the EIGRP process.BDuplicate EIGRP router IDs.CMismatched Hold Timers.DIP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.

多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destination.BThe forwarding table contains only active routes.CThe forwarding table is used to process transit packets.DThe forwarding table is stored in compact flash.

多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destination.BThe forwarding table contains only active routes.CThe forwarding table is used to process transit packets.DThe forwarding table is stored in compact flash

多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destinationBThe forwarding table constains only active routesCThe forwarding table is used to process transit packetsDThe forwarding table is stored in compact flash