多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets
多选题
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A
all interfaces in the path toward the destination
B
all networks in the path toward the destination
C
adjacent next hop router in the path toward the destination
D
all routers in the path toward the destination
E
all interfaces through which the packets can be routed
F
type of service and precedence in the IP packets
参考解析
解析:
暂无解析
相关考题:
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?() A. routing tableB. forwarding tableC. routing protocolD. neighbor or peer
Which two statements are true regarding routing policy processing?() A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.
You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?() A.BusB.MeshC.MultipathD.Ring
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets
Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?() A. Confirm if there are other problematic route - map statements that precede divert.B. Check the access list for log hits.C. Check the routing table for 212.50.185.126.D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)
Which two routing protocols require a metric to be configured when redistributing routes from other protocols?() A. RIPB. BGPC. IS - ISD. OSPFE. EIGRP
You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets
A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN
A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect
Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A、The tunnel that is not configured with the policy-class command acts as the defaultB、EXP selection is between multiple tunnels to the same destinationC、There is no requirement for IGP extensionsD、Tunnels are configured using the policy-class command and carry multiple EXP valuesE、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer
Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A policy based routing (PBR)B unicast reverse path forwarding (uRPF)C lock and keyACLD RFC 1918filteringE IP source routing
多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified
单选题When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()Arouting tableBforwarding tableCrouting protocolDneighbor or peer
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified
单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()AIt is a route to be used when the routing protocol fails.BIt is a route configured by an ISP that sends traffic into a corporate network.CIt is a route used when a packet is destined for a remote network that is not listed in the routing table.DIt is a route manually configured for a specific remote network for which a routing protocol is not configured.EIt is used to send traffic to a stub network.
单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN
单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()AEnd systemBProtocolCApplicationDThroughput
多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets
多选题Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()APackets entering F0/0 will be compared based on the PBR route map.BPackets exiting F0/0 will be compared based on the PBR route map.CIOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.DIOS ignores the PBR forwarding directions when the packet matches a route map permit clause.
多选题Which two statements are true regarding routing policy processing?()AThe Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.BPolicies are evaluated from right to left as displayed in the Junos OS configuration file.CPolices are evaluated based on the order in which they are applied to a routing protocol.DPolicy processing stops once the last statement in the policy is evaluated.