Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()A、The i nterface used by one router to connect to the other router is passive in the EIGRP process.B、Duplicate EIGRP router IDs.C、Mismatched Hold Timers.D、IP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.
Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()
- A、The i nterface used by one router to connect to the other router is passive in the EIGRP process.
- B、Duplicate EIGRP router IDs.
- C、Mismatched Hold Timers.
- D、IP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.
相关考题:
When configuring QoS on a wireless controller, the per-user, real-time bandwidth contract isenforced for which of the following protocols?()A、IPB、TCPC、UDPD、IPX
What are two outcomes of deploying virtual SANs?() (Choose two.)A、increased administrationB、improved availabilityC、reduced backupD、increased securityE、greater storage demand
Which two steps are the result of associating a blade server?()A、The compute node reboots and is then connected to the CMCB、A compute node is assigned to a service profileC、if the association is successful the cisco UCS manager boots the cisco UUOS to configure the compute nodeD、The compute node reboots to reload and then loads NX OS and establishes connections to both the CMC and the IOMs
How many WLANs can a Cisco Aironet 1242 in H-REAP mode support when actively connected toawireless controller?()A、4B、32C、8D、16
In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups aretrue? ()A、Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.B、MDTs are built in customer networksC、Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.D、MDTs are built in provider networksE、The number of MDTs depends on PIM modes of MDT groups.
Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)A、no single point of failureB、trading database server locationC、redundant application servers locationD、deterministic response to all failuresE、determine which protocol to use
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA
You have just completed an OSPF implementation. While executing your verification plan, you determine that R1 is not able to establish full OSPF adjacency with R2. The show ip ospf neighbor comman d output on R1 shows that R2 is stuck in the INIT state. What could be the cause of this problem?()A、DR and BDR election errors between R1 and R2.B、The R2 router has not received the OSPF hello packets from the R1 router.C、Mismatched interface ma ximum transmission unit (MTU) configuration between the R1 and R2.D、Mismatched OSPF hello interval configuration between the R1 and R2E、Corrupted LSAs exchanges between the R1 and R2.
Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication
A RIP router has an entry in the routing table for a specific network destination. It then gets updated with another entry for that same destination, but with a higher path cost (hop count) than the one already in the routing table. What will the router do in this situation?()A、It will ignore the update and take no further action.B、It will add the update information to its routing table.C、It will replace the existing routing table entry with the update information.D、It will delete the existing routing table and will send out hello packets to rebuild the routing table.