多选题Which two statements are true about the role of split horizon?()AIt is a function used by routing protocols to install routes into routing tableBIt is a function that prevents the advertising of routes over an interface that the router is usingto reach a routeCIts function is to help avoid routing loops.DIt is a redistribution technique used by routing protocols

多选题
Which two statements are true about the role of split horizon?()
A

It is a function used by routing protocols to install routes into routing table

B

It is a function that prevents the advertising of routes over an interface that the router is usingto reach a route

C

Its function is to help avoid routing loops.

D

It is a redistribution technique used by routing protocols


参考解析

解析: 暂无解析

相关考题:

Which two statements are true about pool-based source NAT? ()(Choose two.) A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.

Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which two statements are true regarding the role of the Routing Engine (RE)?()A、The RE controls and monitors the chassis.B、The RE manages the Packet Forwarding Engine (PFE).C、The RE receives a copy of the forwarding table from the forwarding plane.D、The RE implements class of service (COS).

Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards

Which two statements are true about the role of split horizon?()A、It is a function used by routing protocols to install routes into routing tableB、It is a function that prevents the advertising of routes over an interface that the router is usingto reach a routeC、Its function is to help avoid routing loops.D、It is a redistribution technique used by routing protocols

Which two statements about VPLS are true? ()A、There is a full mesh of pseudowires.B、There is a partial mesh of pseudowires.C、Only L2TPv3 can be used for pseudowire establishment.D、There is split-horizon to avoid loops.

Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.

Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.

Which two statements are true about the roles in the Oracle database?()A、A role can be granted to itself.B、Roles are owned by the SYS user.C、Roles can be granted to other roles.D、A role cannot be assigned external authentication.E、A role can contain both system and object privileges.

多选题If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?()AAll roles are evaluated together.BEach role is evaluated separately.CClients must pass all policies to access the role.DClients will pass as long as one policy is accepted.

多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

多选题By default, which two statements are true about export routing polices?()AExport polices can evaluate only active routesBExport polices can evaluate all routesCExport polices can be applied to the forwarding tableDExport polices can be applied to interfaces

多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP

多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view

多选题Which two statements about SCSI are true? ()AThe bus is limited to 32 devicesBIt is a full duplex serial standardCIt is a half-duplex serial standardDIt allows up to 320 MB/s of shared channel bandwidth

多选题Which two statements about VPLS are true? ()AThere is a full mesh of pseudowires.BThere is a partial mesh of pseudowires.COnly L2TPv3 can be used for pseudowire establishment.DThere is split-horizon to avoid loops.

多选题Which two statements are true about the roles in the Oracle database?()AA role can be granted to itself.BRoles are owned by the SYS user.CRoles can be granted to other roles.DA role cannot be assigned external authentication.EA role can contain both system and object privileges.

多选题Which two statements are true about record groups?()AThey are stored in the database.BThey are stored in local Forms memory.CThe type is specified explicitly at design time.DThe type is implied by when and how it is created.

多选题Which two statements are true about IBGP neighbor relationships?()AThe BGP split - horizon rule specifies that routes learned via EBGP are never propagated to other IBGP peers.BThe BGP split horizon rule specifies that routes learned via IBGP are never propagated to other IBGP peers.CA full - mesh IBGP requires that neighbor relationships be established between a ll BGP enabled routers in the autonomous system.DIBGP neighbors must be in different autonomous systems.EAn EGP or static routing is required between IBGP neighbors.

多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.