单选题What is correct regarding the configuration shown below?() (1)static route 0.0.0.0/0 (2)qualified-next-hop 172.30.25.1 preference 7 (3)next-hop 172.30.25.5AThe next-hop 172.30.25.1 is selected because the address has the lowest value.BThe next-hop 172.30.25.1 is selected because it is listed first.CThe next-hop 172.30.25.1 is selected because it is the lowest protocol preference.DThe next-hop 172.30.25.5 is selected because it is the lowest protocol preference.

单选题
What is correct regarding the configuration shown below?() (1)static route 0.0.0.0/0 (2)qualified-next-hop 172.30.25.1 preference 7 (3)next-hop 172.30.25.5
A

The next-hop 172.30.25.1 is selected because the address has the lowest value.

B

The next-hop 172.30.25.1 is selected because it is listed first.

C

The next-hop 172.30.25.1 is selected because it is the lowest protocol preference.

D

The next-hop 172.30.25.5 is selected because it is the lowest protocol preference.


参考解析

解析: 暂无解析

相关考题:

You have configured a Ezonexam switch as shown below:Ezonexam3(config-if) switchport port-securityEzonexam3(config-if) switchport port-security mac-address stickySelect the action below that results from executing these commands.A. A dynamically learned MAC address is saved in the VLAN database.B. A dynamically learned MAC address is saved in the startup-configuration file.C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.D. A dynamically learned MAC address is saved in the running-configuration file.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.F. None of the above

Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?() A. to protect the Routing EngineB. to protect all interfaces on the deviceC. to protect the Packet Forwarding EngineD. to protect the management interface

Given the configuration shown in the exhibit, which statement is correct about traffic matching the route 10.10.10.0/24?() A. It will be forwarded to 192.168.100.1 using a metric of 10.B. It will be forwarded to 192.168.100.1 using a metric of 8.C. It will be forwarded to 192.168.200.1 using a metric of 8.D. It will be forwarded to 192.168.200.1 using a metric of 10.

What is the correct virtual link configuration on an OSPF router?() A.B.C.D.

Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?() A. The crypto isakmp configuration is not correct.B. The crypto map configuration is not correct.C. The interface tunnel configuration is not correct.D. The network configuration is not correct; netw ork 172.16.1.0 is missing.

While troubleshooting a serial line problem, you enable ppp authentication debugging as shown below:Based on the command output above, what type of ‘handshake‘ was used for PPP authentication?() A. one-wayB. two-wayC. three-wayD. four-wayE. no handshakes required during authenticationF. None of the above

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

What operation on relations R and S produces the relation shown below?A.UnionB.DifferenceC.IntersectionD.Division

Which descriptions of Netflow is correct?()A、By default,Netflow records bidirectional IP traffic flow.B、Netflow answers questions regarding IP traffic:who,what,where,when,and howC、Netflow accounts for both transit traffic and traffic destined for the router.D、Netflow returns the subinterface information in the flow records.

What is the purpose of the command shown below?vtp password Fl0r1da()A、It is used to validate the sources of VTP advertisements sent between switches.B、It is used to access the VTP server to make changes to the VTP configuration.C、It allows two VTP servers to exist in the same domain, each configured with different passwords.D、It is the password required when promoting a switch from VTP client mode to VTP server mode.E、It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

What is correct regarding the configuration shown below?() (1)static route 0.0.0.0/0 (2)qualified-next-hop 172.30.25.1 preference 7 (3)next-hop 172.30.25.5A、The next-hop 172.30.25.1 is selected because the address has the lowest value.B、The next-hop 172.30.25.1 is selected because it is listed first.C、The next-hop 172.30.25.1 is selected because it is the lowest protocol preference.D、The next-hop 172.30.25.5 is selected because it is the lowest protocol preference.

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem? ()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0A、The process id is configured improperlyB、The OSPF area is configured improperlyC、The network wildcard mask is configured improperlyD、The network number is configured improperlyE、The AS is configured improperlyF、The network subnet mask is configuerd improperly

A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A、 The host will be allowed to connect.B、 The port will shut down.C、 The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D、 The host will be refused access.E、 None of the other alternatives apply

Router R1 is configured as shown below: router eigrp 100 network 10.0.0.0 eigrp stub Based on the information shown above, which two types of routes will be advertised?()A、Receive - onlyB、StubC、StaticD、SummaryE、ConnectedF、Dynamic

The resource group configuration for a four node cluster is shown below:Which resource groups will be acquired by node N2 if it joins the cluster first?()A、rgC、rgEB、rgC、rgDC、rgE、rgB、rgDD、rgC、rgD、rgE

A customer plans to implement SVC as part of a solution and has concerns regarding the resilience of the SVC architecture. The correct response to this concern is that SVC().A、is stateless with global referencing of metadataB、is based on cluster architecture with externally provided quorum disksC、is based on cluster architecture, with quorum held internally on the first cluster nodeD、is based on grid architecture, with each node holding a full mirror configuration for all other nodes

单选题A customer plans to implement SVC as part of a solution and has concerns regarding the resilience of the SVC architecture. The correct response to this concern is that SVC().Ais stateless with global referencing of metadataBis based on cluster architecture with externally provided quorum disksCis based on cluster architecture, with quorum held internally on the first cluster nodeDis based on grid architecture, with each node holding a full mirror configuration for all other nodes

多选题Which two statements regarding configuring high availabily in the Cisco UCS is correct?()AHigh availability is enabled during the configuration of either HSRP or VRRP from global configuration modeBHigh availability is configured during the initial setup of both Fabric interconnectsCHigh availability can only be configured via the CMCDHigh availability is enabled during theinitial configuration of one of the Fabric lnterconnects

单选题A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A The host will be allowed to connect.B The port will shut down.C The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D The host will be refused access.E None of the other alternatives apply

多选题Router R1 is configured as shown below: router eigrp 100 network 10.0.0.0 eigrp stub Based on the information shown above, which two types of routes will be advertised?()AReceive - onlyBStubCStaticDSummaryEConnectedFDynamic

单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed

单选题A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?() Router(config)#router ospf 1 Router(config-router)#network 10.0.0.0 255.0.0.0 area 0AThe process id is configured improperlyBThe OSPF area is configured improperlyCThe network wildcard mask is configured improperlyDThe network number is configured improperlyEThe AS is configured improperlyFThe network subnet mask is configuerd improperly

单选题What is the purpose of the command shown below vtp password Fl0r1da()。AIt is used to validate the sources of VTP advertisements sent between switches.BIt is used to access the VTP server to make changes to the VTP configuration.CIt allows two VTP servers to exist in the same domain, each configured with different passwords.DIt is the password required when promoting a switch from VTP client mode to VTP server mode.EIt is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

多选题Which descriptions of Netflow is correct?()ABy default,Netflow records bidirectional IP traffic flow.BNetflow answers questions regarding IP traffic:who,what,where,when,and howCNetflow accounts for both transit traffic and traffic destined for the router.DNetflow returns the subinterface information in the flow records.

单选题An IT services provider, has a new requirement for you to be able to field general calls concerning System x Servers as a backup function for a tech support person in your company. You have been told to pass on anything that requires more of a solutions-based answer and only answer questions regarding what option goes with what servers.  What tool best accomplishes this task?()AIBM Configurations and Options GuideBIBM Server ProvenCIBM System x Sales Configuration AidDIBM xREF SheetsEIBM Standalone Solutions Configuration Tool

单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejected.B The traffic will be dropped.C The traffic will be forwarded.D The traffic will be policed.

单选题What is the correct configuration of Anycast RP on the loopback interface, assuming a shared anycast address of 10.1.1.1?()A AB BC CD D