Which two statements are correct regarding default protocol preference values?()A、OSPF has a single preference value for both internal and external routes.B、RIP is preferred over OSPF external routes.C、Direct, local, and static routes have the same preference value.D、OSPF's preference value is lower than BGP (both IBGP and EBGP).

Which two statements are correct regarding default protocol preference values?()

  • A、OSPF has a single preference value for both internal and external routes.
  • B、RIP is preferred over OSPF external routes.
  • C、Direct, local, and static routes have the same preference value.
  • D、OSPF's preference value is lower than BGP (both IBGP and EBGP).

相关考题:

In a PPP over ATM service offering, what is a valid method for assigning an address to the ERX Edge Router?()A、DHCP assigned addressesB、RADIUS assigned addressesC、IP numbered with a loopback referenceD、IP unnumbered with a loopback reference

Which two statements are true about TCP communication?()A、The receiver acknowledges the final packet in each communications stream.B、The receiver adds sequencing numbers to the packets received.C、The sender adds sequencing numbers to the packets it sends.D、The receiver acknowledges each packet it receives from the sending device.

What configuration command allows the ERX Edge Router to advertise customer networks into the provider’s IGP?()A、redistribute directB、redistribute staticC、redistribute connectedD、redistribute access-internal

Which two characteristics describe the UDP protocol?()A、limited error checkingB、defined timersC、no recovery mechanismsD、three-way handshake

What is one way to escape hardware bypass mode?()A、Reset the cabling.B、Power cycle the device.C、Bounce the service tunnels.D、Unlock the device from the console.

Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)A、Throughput is raised as latency decreases.B、Throughput is based on available bandwidth.C、Throughput is lowered as latency decreases.D、Latency is measured by SYNs returned for each metapacket

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP

Which setting in JUNOS software forces a bgp speaker to wait for a bgp neighbor to initiate a bgp session?()A、waitB、holdC、passiveD、authenticate

Which two signaling protocols could be used in VPLS to advertise site information between PEs? ()A、IKEB、BGPC、RSVPD、LDP