多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE
多选题
Which two steps are required for a Kompella Layer 2 VPN?()
A
Configure a site ID for each CE
B
Configure a VPN label for each VPN
C
Configure a MP-BGP session to each PE
D
Configure an Extended LDP Session to each PE
参考解析
解析:
暂无解析
相关考题:
Which two mechanisms control route distribution between PE routers in a 2547bis VPN?() A. site idB. policiesC. circuit idD. extended communities
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?() A. an LSP for each local CE deviceB. an LSP for each remote PE deviceC. an LSP for each remote CE deviceD. an LSP for each CE facing interface
哪一项不是pre-launch LTE drive test?() A.Each session started from EMM-DEREGISTERED stateB.Each session started from RRC-IDLE EMM-REGISTERED stateC.Each session started from RRC-CONNECTED stateD.Each session started from pdp-connect-request
哪一项不是pre-launch LTE drive test?()A、Each session started from EMM-DEREGISTERED stateB、Each session started from RRC-IDLE EMM-REGISTERED stateC、Each session started from RRC-CONNECTED stateD、Each session started from pdp-connect-request
Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.
A company has a Frame Relay WAN with one central - site router and 100 branch office routers. A partial mesh of PVCs exists: one PVC between the central site and each of the 100 branch routers. Which of the following could be true about the number of EIGRP neighbor ships?()A、A partial mesh totaling 100: one between the central - site router and each of the 100 branches.B、A full mesh - (101 * 100) / 2 = 5050 - One neighborship between each pair of routers.C、101 - One between each router (including the central site) a nd its nearby PE router.D、None of the answers is correct.
What are the "bound IP addresses" used for in LDP?()A、For each such address and mask /32, one label binding is created.B、As the TCP endpoint, IP addresses are used by the LDP session.C、These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.D、These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly.
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface
Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.
In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A、IP address and IP label of each service and boot interface in the clusterB、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses
What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes
Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a site ID for each CEB、Configure a VPN label for each VPNC、Configure a MP-BGP session to each PED、Configure an Extended LDP Session to each PE
Which two mechanisms control route distribution between PE routers in a 2547bis VPN?()A、Site IDB、PoliciesC、Circuit IDD、Extended communities
Your company has 10 offices. The offices connect to the Internet by using a WAN link. The offices connect to each other by using a VPN connection. An Active Directory site exists for each office. You plan to deploy Exchange Server 2010. Each site will contain two Exchange Server 2010 servers. You need to recommend the placement of domain controllers and global catalog servers to meet thefollowing requirements: .Minimize the number of domain controllers .Must be able to deliver e-mail messages between users of the same office, if a domain controller and aWAN link fail simultaneously What should you recommend?()A、In each site, install two global catalog servers.B、In each site, install two domain controllers. Enable Universal Group Membership caching for each site.C、In each site, install two domain controllers. Create a publishing point for an offline address list on one Exchange server in each site.D、In each site, install one domain controller that is configured as a global catalog server.Enable Universal Group Membership caching for each site.
You deploy mobile devices that run Microsoft Windows Mobile 5.0. A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible. You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated. Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.
You are designing the forest and domain structure to meet the business and technical requirements. Which structure should you use?()A、 A single forest with one tree, and one domainB、 A single forest with one tree two domainC、 A single forest with two trees, each with a single domainD、 Two forests, each with a single tree and a single domainE、 Two forests, each with two trees, with a single domain in each tree.
单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do?()AConfigure a VPN server in Sydney.BConfigure a VPN server in each branch office.CConfigure a dial-up server in Sydney.DConfigure a dial-up server in each branch office.
单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()AConfigure a demand-dial router.BCreate multiple Active Directory site links.CConfigure a VPN connection between each branch office.DInstall an Internet Authentication Service (IAS) server in each branch office.
多选题Which two statements accurately describe an IBGP peering session?() (Choose two.)APeers are statically defined.BPeers exist within the same AS.CPeers must be directly connected to each other.DPeers advertise routes learned from other IBGP neighbors.
多选题Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()AMPLS LSPBATM tunnelCGRE tunnelDIPSEC tunnelEL2TPv3 session
多选题You are the network administrator for your company. The network consists of a single Active Directory domain with three sites named Site1, Site2, and Site3. The sites and site links are configured to use Site2 to connect Site1 and Site3. Each site contains three Windows Server 2003 domain controllers. A domaincontroller in each site is configured as a preferred bridgehead server. All user and group accounts are created in Site1. Several new users start work in Site2. When they attempt to log on to the network, the logon fails. You confirm that the user accounts are created and are visible in Site1 and Site2. You discover that the preferred IP bridgehead server in Site2 failed. You repair the server and confirm that replication is successful to Site2. You need to ensure that the failure of a single domain controller in any site will not interfere with Active Directory replication between sites. What are two possible ways to achieve this goal?()AConfigure an IP site link between Site1 and Site3.BConfigure two domain controllers in each site as preferred IP bridgehead servers.CConfigure two domain controllers in each site as preferred SMTP bridgehead servers.DConfigure each site to have no preferred bridgehead servers.EConfigure an SMTP site link between each of the sites. Assign a cost of 200 to the SMTP site link.
单选题What is required during the initial creation of a cluster?()A Nothing,because HACMP will discover the configurationB The cluster name and a TCP/IP path to each of the nodesC The cluster name and ID and a TCP/IP path to each of the nodesD The cluster name and ID node names and a TCP/IP path to each of the nodes
单选题What are the "bound IP addresses" used for in LDP?()AFor each such address and mask /32, one label binding is created.BAs the TCP endpoint, IP addresses are used by the LDP session.CThese addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.DThese addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly.
多选题You deploy mobile devices that run Microsoft Windows Mobile 5.0. A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible. You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated. Which two actions should you perform?()ASelect L2TP/IPSec on each Windows Mobilebased device.BObtain and install a certificate on each Windows Mobilebased device.CConfigure the appropriate pre-shared key on each Windows Mobilebased device.DSelect Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.
单选题What are the basic configuration steps to enable IS - IS?()AConfigure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.BConfigure the net sy stem - id and the network net - id commands under routerisis.CConfigure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.DConfigure the network net - id command(s) and the is - type level -1- 2 command under routerisis.EConfigure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a siteid for each ce.BConfigure a VPN label for each VPN.CConfigure a MP-bgp session to each pe.DConfigure an Extended LDP Session to each pe.
单选题Company.com has two POWER5 servers. They want the two servers’ virtual Ethernets to appear on the same IP subnet. Which of the following will connect the client virtual Ethernet adapters to the physical Ethernet switch connecting the two servers?()AConfigure a Shared Ethernet Adapter on the Virtual I/O Server.BUse the same virtual LAN ID on each LPAR.CSet up IP routing through an LPAR on each system.DSet up an IP firewall through an LPAR on each system.
多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE