Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()A、Configure OSPF between trigger router and black hole routesB、Configure all edge routers with static (reserved) host route to Null0C、Configure BGP beteen trigger and black hole routersD、Configure on trigger router to advertise victim host route with commumityE、Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge routers
Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()
- A、Configure OSPF between trigger router and black hole routes
- B、Configure all edge routers with static (reserved) host route to Null0
- C、Configure BGP beteen trigger and black hole routers
- D、Configure on trigger router to advertise victim host route with commumity
- E、Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge routers
相关考题:
Users are unable to access resources in the 172.23.14.0/24 subnet.Referring to the exhibit, which two actions would solve this problem?() A. Configure a separate routing instance.B. Configure a default static route.C. Configure a static route to 172.23.14.0/24.D. Configure the existing routes to resolve the indirect next hop.
Which of the following is the primary motivation for using BGP between an Enterprise and its ISPs?() A. To influence the choice of best path (best route) for at least some routesB. To avoid having to configure static routesC. To allow redistribution of BGP routes into the IGP routing protocolD. To monitor the size of the Internet BGP table
Refer to the diagram. Which OSPF configuration command is required to configure Area 3 a s atotally stubby area?() A. On the ABR router ospf 10 area 3 stubB. On all Area 3 routers router ospf 10 area 3 stubC. On all Area 3 routers router ospf 10 area 3 stub no - summaryD. On the ABR router ospf 10 area 3 nssaE. On the ABR rou ter ospf 10 area 3 stub no - summary
In which situation would the use of a static route be appropriate?() A. To configure a route to the first Layer 3 device on the network segment.B. To configure a route from an ISP router into a corporate network.C. To configure a route when the administrative distance of the current routing protocolis too low.D. To reach a network is more than 15 hops away.E. To provide access to the Internet for enterprise hosts.
The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems (Choose two.)()。 A.Configure the gateway on Host A as 10.1.1.1B.Configure the gateway on Host B as 10.1.2.254C.Configure the IP address of Host A as 10.1.2.2D.Configure the IP address of Host B as 10.1.2.2E.Configure the masks on both hosts to be 255.255.255.224F.Configure the masks on both hosts to be 255.255.255.240
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
According to the fourth paragraph, which of the following is NOT true?A. No nuclear explosion would be triggered inside the star.B. The star would be destroyed completely.C. Much of the star's matter thrown by the explosion would be beyond the black hole's reach.D. The black hole would completely devour the star.
Which of the following is the primary motivation for using BGP between an Enterprise and its ISPs?()A、To influence the choice of best path (best route) for at least some routesB、To avoid having to configure static routesC、To allow redistribution of BGP routes into the IGP routing protocolD、To monitor the size of the Internet BGP table
Which statement about Remotely Triggered Black Hole (RTBH) is true?()A、Route tagging is one of the techniques used by RTBHB、It is used for BGP authenticationC、It cannot work with static routesD、It uses extended ACLs for blocking attacks by creating a black holeE、Before configuring RTBH LDP must be enabled on the interface
A router learns about a remote network from EIGRP, OSPF, and a static route. Assuming all routing protocols are using their default administrative distance, which route will the router use to forward data to the remote network()。A、The router will use the static route.B、The router will use the OSPF route.C、The router will use the EIGRP route.D、The router will load balance and use all three routes.
In which situation would the use of a static route be appropriate?()A、To configure a route to the first Layer 3 device on the network segment.B、To configure a route from an ISP router into a corporate network.C、To configure a route when the administrative distance of the current routing protocolis too low.D、To reach a network is more than 15 hops away.E、To provide access to the Internet for enterprise hosts.
Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system
Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()A、Configure a non-unique address on the loopback interface for use by the PIM RP.B、Configure MSDP with the unique address (router ID) as the local address of the peer.C、Configure MSDP with the non-unique address (router ID) as the local address of the peer.D、Configure a unique address on the loopback interface, used as the PIM RP.
Which two of these steps are minimum requirements to configure OSPFv3 under IPv6?()A、Configure a routing process using the command ipv6 router ospf [process-id].B、Add the network statement for the interfaces on which OSPF will run.C、Configure OSPF on the interface that it will run on.D、Use the passive-interface command on the interfaces on which OSPF should not run.E、Enable routing.
Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.
What is the requirement of Remote Triggered Black Hole (RTBH ) filtering?()A、IBGP updates exchange between trigger router and black hole routerB、EBGP updates exchange between trigger router and black hole routerC、OSPF updates exchange between trigger router and black hole routerD、ISIS updates exchange between trigger router and black hole router
The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0
You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
You are designing a strategy to provide Internet access to all users. What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.
Which of the following options allows for the remote administration of a Core installation of Windows Server 2012 R2 from another server running Windows Server 2012 R2?()A、Configure Router Guard.B、Configure Port Mirroring.C、Enable Remote Management.D、Enable Remote Desktop.E、Using Server Manager.
单选题Which of the following is TRUE about the ate program?()AWhen running ate for the first time it will prompt for all the required information and configure all the required devicesBThe program is used by cu to communicate to a remote systemCThe program is used for remote communications between the host and a remote system using a modem or null modem via a tty portDThe program ate calls cu to communicate with the remote system
多选题Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()AConfigure OSPF between trigger router and black hole routesBConfigure all edge routers with static (reserved) host route to Null0CConfigure BGP beteen trigger and black hole routersDConfigure on trigger router to advertise victim host route with commumityEActivate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge routers
单选题In which situation would the use of a static route be appropriate?()ATo configure a route to the first Layer 3 device on the network segment.BTo configure a route from an ISP router into a corporate network.CTo configure a route when the administrative distance of the current routing protocolis too low.DTo reach a network is more than 15 hops away.ETo provide access to the Internet for enterprise hosts.
单选题Which statement about Remotely Triggered Black Hole (RTBH) is true?()ARoute tagging is one of the techniques used by RTBHBIt is used for BGP authenticationCIt cannot work with static routesDIt uses extended ACLs for blocking attacks by creating a black holeEBefore configuring RTBH LDP must be enabled on the interface
单选题What is the requirement of Remote Triggered Black Hole (RTBH ) filtering?()AIBGP updates exchange between trigger router and black hole routerBEBGP updates exchange between trigger router and black hole routerCOSPF updates exchange between trigger router and black hole routerDISIS updates exchange between trigger router and black hole router
单选题You are designing a strategy to provide Internet access to all users. What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.