A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()A、route redistributionB、import and export using route descriptorsC、import and export using route targetsD、Cisco MPLS Traffic Engineering

A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()

  • A、route redistribution
  • B、import and export using route descriptors
  • C、import and export using route targets
  • D、Cisco MPLS Traffic Engineering

相关考题:

You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.However, users report that they can see EzonexamDocs when they browse for shared folders.How should you solve this problem?A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.C.Change the share name to EzonexamDocs #.D.Change the share name to EzonexamDocs $.

Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

Which attribute allows a VRF to accept VPN routes from another VRF?() A. route listB. route originC. route targetD. route distinguisher

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.

Refer to the exhibit. IP multicast for group address 224.1.1.1 has been enabled on all router s in the network. Hosts on Network A receive the multicast traffic. However, hosts on Network B do not. On the basis of outputs provided, what could be the cause of the problem? ()A. The route to 224.69.15.0/24 will be out Ethernet 0B. The reverse path forwarding (RPF) for the route 224.2.0.1 failed to find the interface on which the multicast packet was rece ivedC. Multicast route to 224.69.15.0/24 was added to the mroute table and created by a source directly connected to the routerD. Multicast route to 10.16.0.0/16 was added to the mroute table and created by a source directly connected to the routerE. This router received an IGMP host report from a group member or a PIM join message

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

Which of the following attributes allows a VRF to accept VPN routes from another VRF? ()A、 route listB、 route originC、 route targetD、 toute distinguisher

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet

Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries

A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A、ipforwarding turned on and two adaptersB、One adapter, with a route to a default gatewayC、An adapter in each network, and ipforwarding offD、An adapter in each network, with a route only to the default gateway

A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server A and serve BC、create a $HOME/.netrc for all users on server A and serve rBD、create a /etc/hosts.equiv on server A and server B

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()A、access profileB、IKE parametersC、tunneled interfaceD、redirect policy

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Which attribute allows a VRF to accept VPN routes from another VRF?()A、route listB、route originC、route targetD、route distinguisher

You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A、It is a list of remote database links stored in the XML file that are available to the users of the database.B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.

You are the administrator of ExamSheet's Windows 2000 network.  You need to store secured files for ExamSheet's accounting and legal departments on a Windows 2000 Professional computer. You create two shared folders named Accounting and Legal with the default NTFS and share permissions. You also create two groups named Accounting and Legal and add the appropriate user accounts into the appropriate groups. To meet the security requirements for the shared folders the following criteria must be met:  1.Users in both departments must be able to update their own files from the network.  2.Users in the accounting department must be able to view the legal department's documents from the network.  3.Users in the legal department must be prevented from being able to view the accounting department's documents from the network.You want to ensure that all security requirements are met using the least amount of administrative effort.  What should you do? ()A、Allow the Accounting groupReadpermission on the Accounting share and the Legal shared folder. Allow the Legal groupReadpermissions on the Legal shared folder.B、Allow the Accounting groupFull Controlpermissions on the Accounting shared folder and the Legal shared folder. Allow the Legal groupFull Controlpermission on the Legal shared folder.C、Deny the Everyone groupFull Controlpermissions on the Accounting shared folder.D、Deny the Legal groupFull Controlpermission on the Accounting shared folder.

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. TestKing operates offices in London, Paris, and Amsterdam. Each office is configured as a separate Active Directory site. Each office has a file server for local users. ChiFile is the file server in London. It hosts a shared folder. Users report that they can no longer connect to the shared folder. A help desk technician who is a member of the Power Users group reports that he cannot connect to ChiFile. However, you are able to make a successful connection with ChiFile by using Terminal Services. How should you solve this problem?()A、Add Windows Server 2003 licenses to the Site License server for London.B、Change the licensing mode on ChiFile from Per Device or User to Per Server.C、Change the licensing mode on ChiFile from Per Server to Per Device or User.D、Install a Terminal Services Enterprise license server on the London domain controller

单选题You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. TestKing operates offices in London, Paris, and Amsterdam. Each office is configured as a separate Active Directory site. Each office has a file server for local users. ChiFile is the file server in London. It hosts a shared folder. Users report that they can no longer connect to the shared folder. A help desk technician who is a member of the Power Users group reports that he cannot connect to ChiFile. However, you are able to make a successful connection with ChiFile by using Terminal Services. How should you solve this problem?()AAdd Windows Server 2003 licenses to the Site License server for London.BChange the licensing mode on ChiFile from Per Device or User to Per Server.CChange the licensing mode on ChiFile from Per Server to Per Device or User.DInstall a Terminal Services Enterprise license server on the London domain controller

多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface

单选题A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able  to route to and from VRF_C, which hosts shared services. However, traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()Aroute redistributionBimport and export using route descriptorsCimport and export using route targetsDCisco MPLS Traffic Engineering

单选题Which of the following attributes allows a VRF to accept VPN routes from another VRF? ()A route listB route originC route targetD toute distinguisher

多选题Users can define policy to control traffic flow between which two components? ()(Choose two.)Afrom a zone to the router itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface