The maximum number of routers per OSPF area typically depends on which three factors?()A、the kind of OSPF areas being implementedB、the number of external LSAs in the networkC、the number of DRs and BDRs in the areasD、the number of virtual links in the areasE、how well the areas can be summarizedF、the use of LSA filters

The maximum number of routers per OSPF area typically depends on which three factors?()

  • A、the kind of OSPF areas being implemented
  • B、the number of external LSAs in the network
  • C、the number of DRs and BDRs in the areas
  • D、the number of virtual links in the areas
  • E、how well the areas can be summarized
  • F、the use of LSA filters

相关考题:

The maximum number of data that Can be expressed by 8 bits iS(72).A.64B.128C.255D.256

Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.) A. IGP routes advertised by P routersB. IGP routes advertised by PE routersC. VPN routes advertised by PE routersD. VPN routes advertised by CE routers

The maximum number of routers per OSPF area typically depends on which three factors?() A. the kind of OSPF areas being implementedB. the number of external LSAs in the networkC. the number of DRs and BDRs in the areasD. the number of virtual links in the areasE. how well the areas can be summarizedF. the use of LSA filters

The certificate of inspection of a vessel will specify the ______.A.number of licensed personnel required on boardB.maximum load line draftC.maximum water depth for drillingD.next date for an inclining experiment

Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()A、the number of computer blades in the systemB、the number of interfaces sharing the uplinksC、the driver version on the OS running on the computer bladeD、the number of uplinks between I/O Module and Fabric Interconnect

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

Which statement is correct about an OSPF sham-link?()A、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.B、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.C、A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.D、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.E、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

Which four statements about the Carrier Supporting Carrier (CSC) feature are true? ()A、MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.B、The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.C、Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labelsD、AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.E、Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.

When BGP is used as the PE-CE routing protocol, which of these statements is correct?()A、On the CE router, PE neighbors must be configured in the VRF context on the CE routerB、On PE routers, the CE IBGP neighbors are configured in the global BGP configurationC、On PE routers, the CE EBGP neighbors are configured in the VRF contextD、A separate BGP process must be used on the PE routers for CE routers so that they do not use the same BGP routing process as that used for the PE router's other provider neighbors

A data processing company is comparing the specifications of the SunFire 6800, SunFire 12k and the IBM pSeries 670 for a server consolidation project. Which of the following p670 capabilities would provide the most significant benefit for server consolidation?()A、Maximum memoryB、Maximum processor speedC、Maximum number of PCI slotsD、Maximum number of partitions

What is the maximum number of CTI ports for a Cisco Unified Contact Center Express 4.0 Standard deployment? ()A、150  B、200  C、300  D、varies based on the number of expansion servers used  E、varies based on the number of applications configured

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

What are  minimum and maximum number of extent pools on an IBM System Storage DS8800 with 64 physical disks()A、the minimum is 1 and the maximum is 8B、the minimum is 2 and the maximum is 8C、the minimum is 2 and the maximum is 16D、the minimum is 1 and the maximum is 64

Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.)A、IGP routes advertised by P routersB、IGP routes advertised by PE routersC、VPN routes advertised by PE routersD、VPN routes advertised by CE routers

多选题Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()Athe number of computer blades in the systemBthe number of interfaces sharing the uplinksCthe driver version on the OS running on the computer bladeDthe number of uplinks between I/O Module and Fabric Interconnect

单选题What are  minimum and maximum number of extent pools on an IBM System Storage DS8800 with 64 physical disks()Athe minimum is 1 and the maximum is 8Bthe minimum is 2 and the maximum is 8Cthe minimum is 2 and the maximum is 16Dthe minimum is 1 and the maximum is 64

单选题An HP customer would like to discuss IBM system advantages. Their current system platform is a partitioned HP rp8400. Which of the following pSeries systems and advantages should be discussed?()Ap630. Maximum partitions, maximum storage, I/O bus speedBp670. Maximum partitions, maximum memory, number of I/O slotsCp655. Maximum number of CPUs, processor speed, number of I/O slotsDp690. Maximum number of CPUs, peak system bandwidth, peak I/O bandwidth

多选题The maximum number of routers per OSPF area typically depends on which three factors?()Athe kind of OSPF areas being implementedBthe number of external LSAs in the networkCthe number of DRs and BDRs in the areasDthe number of virtual links in the areasEhow well the areas can be summarizedFthe use of LSA filters

单选题Which statement is correct about an OSPF sham-link?()AA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.BA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.CA sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.DA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.EA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.

单选题When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()AEIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASBOther EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredCUnlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksDConfigure of the VPN is only required on the PE router

单选题When BGP is used as the PE-CE routing protocol, which of these statements is correct?()AOn the CE router, PE neighbors must be configured in the VRF context on the CE routerBOn PE routers, the CE IBGP neighbors are configured in the global BGP configurationCOn PE routers, the CE EBGP neighbors are configured in the VRF contextDA separate BGP process must be used on the PE routers for CE routers so that they do not use the same BGP routing process as that used for the PE router's other provider neighbors

多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider

单选题The maximum number of passengers a Vessel may carry().Ais stated on the vessel's Certificate of InspectionBis the number authorized in the Navigation RulesCdepends on the number of lifejackets you carryDis the number authorized by your license

单选题A company has a Frame Relay WAN with one central - site router and 100 branch office routers. A partial mesh of PVCs exists: one PVC between the central site and each of the 100 branch routers. Which of the following could be true about the number of EIGRP neighbor ships?()AA partial mesh totaling 100: one between the central - site router and each of the 100 branches.BA full mesh - (101 * 100) / 2 = 5050 - One neighborship between each pair of routers.C101 - One between each router (including the central site) a nd its nearby PE router.DNone of the answers is correct.

单选题The maximum number of passengers a T-Boat may carry().Ais stated on the vessel's Certificate of InspectionBis the number authorized in the Navigation RulesCdepends on the number of lifejackets you carryDis the number authorized by your license

单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()AIf using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionBIf using IS-IS as the PE-CE routing protocol, no redistribution is requiredCIf using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredDIf PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required