多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider

多选题
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()
A

A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor link

B

A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchanged

C

A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor door

D

A SHAM link is part of OSPF network of MPLS-VPN provider


参考解析

解析: 暂无解析

相关考题:

Which type of VPN router is not required to run MPLS?() A. Provider Core (P)B. Provider Edge (PE)C. Customer Edge (CE)D. Customer Boundary (CB)

Which VPN router does not contain customer routing knowledge?() A. Provider Core (P)B. Provider Edge (PE)C. Customer Edge (CE)D. Customer Boundary (CB)

Which protocol is used to transfer files to on the ERX Edge Router?() A.SCPB.FTPC.RCPD.TFTP

Gateway is a device used to connect two separate network that use(2)communication protocol.A.same kind ofB.similarC.differentD.same

Which of the following settings do not prevent two potential OSPF neighbors from becoming neighbors?() A. The interface used to connect to that neighbor being passive in the OSPF processB. Duplicate OSPF router IDsC. Mismatched dead timersD. IP addr esses of 10.1.1.1/24 and 10.2.2.2/24E. Mismatched OSPF process IDs

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()A、sham linkB、down bitC、virtual linkD、Site of OriginE、domain tag

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

Which four statements about the Carrier Supporting Carrier (CSC) feature are true? ()A、MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.B、The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.C、Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labelsD、AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.E、Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.

When BGP is used as the PE-CE routing protocol, which of these statements is correct?()A、On the CE router, PE neighbors must be configured in the VRF context on the CE routerB、On PE routers, the CE IBGP neighbors are configured in the global BGP configurationC、On PE routers, the CE EBGP neighbors are configured in the VRF contextD、A separate BGP process must be used on the PE routers for CE routers so that they do not use the same BGP routing process as that used for the PE router's other provider neighbors

What does the protocol field inside the PPP frame indicate?()A、the protocol used to determine the authentication methodB、the protocol used to identify the data in the Information fieldC、the protocol used to carry the PPP frameD、the protocol used to decode the FCS fieldE、the protocol used to detect the number of padding bytes

Which VPN router does not contain customer routing knowledge?()A、Provider Core (P)B、Provider Edge (PE)C、Customer Edge (CE)D、Customer Boundary (CB)

Which type of VPN router is not required to run MPLS?()A、Provider Core (P)B、Provider Edge (PE)C、Customer Edge (CE)D、Customer Boundary (CB)

Which protocol is used to transfer files to on the ERX Edge Router?()A、SCPB、FTPC、RCPD、TFTP

What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol

Which two statements about Layer 3 MPLS VPN are true?()A、The virtual routing and forwarding table is separate from the global routing table that exists on PE routers. Routes are injected into the VRF from the CE-PE routing protocols for that VRF and any MP-BGP announcements that match the defined VRF RTsB、Multiprotocol Border Gateway Protocol is run between PE and CE routers to exchange customer prefixes in a VPNv4 formatC、A customer edge router peers at Layer 3 to the provider edge. The PE-CE interface runs either a dynamic routing protocol (eBGP, RIPv2, EIGRP, OSPF) or a static routing protocol (Static, Connected)D、VPNv4 address is the combination of the RT and customer IPv4 prefix. These VPNv4 prefixes are passed in MP-BGP

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

Which command allows viewing of only OSPF routes?()A、show ip ospf routeB、show ip route protocol ospfC、show route protocol ospfD、show ospf table

单选题What does the protocol field inside the PPP frame indicate?()Athe protocol used to determine the authentication methodBthe protocol used to identify the data in the Information fieldCthe protocol used to carry the PPP frameDthe protocol used to decode the FCS fieldEthe protocol used to detect the number of padding bytes

单选题Which VPN router does not contain customer routing knowledge?()AProvider Core (P)BProvider Edge (PE)CCustomer Edge (CE)DCustomer Boundary (CB)

单选题Which of the following settings do not prevent two potential OSPF neighbors from becoming neighbors?()AThe interface used to connect to that neighbor being passive in the OSPF processBDuplicate OSPF router IDsCMismatched dead timersDIP addr esses of 10.1.1.1/24 and 10.2.2.2/24EMismatched OSPF process IDs

多选题Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()Asham linkBdown bitCvirtual linkDSite of OriginEdomain tag

单选题When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()AEIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASBOther EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredCUnlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksDConfigure of the VPN is only required on the PE router

单选题When BGP is used as the PE-CE routing protocol, which of these statements is correct?()AOn the CE router, PE neighbors must be configured in the VRF context on the CE routerBOn PE routers, the CE IBGP neighbors are configured in the global BGP configurationCOn PE routers, the CE EBGP neighbors are configured in the VRF contextDA separate BGP process must be used on the PE routers for CE routers so that they do not use the same BGP routing process as that used for the PE router's other provider neighbors

多选题What are the three OSPF authentication methods supported on the ERX Edge Router?()Anull passwordBsimple passwordCmessage digest 5DPassword Authentication ProtocolEChallenge Handshake Authentication Protocol

多选题XYZ LTD wants to connect Cisco IP Phones and Cisco Aironet Access Points to the network. The customer also wants to use the PoE features included in the Cisco Catalyst Express 500 Series Switches. Which two models can provide this features?()AWS-CE500G-12TCBWS-CE500-24PCCWS-CE500-24TTDWS-CE500-24LC

单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()AIf using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionBIf using IS-IS as the PE-CE routing protocol, no redistribution is requiredCIf using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredDIf PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required