When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
- A、all interfaces in the path toward the destination
- B、all networks in the path toward the destination
- C、adjacent next hop router in the path toward the destination
- D、all routers in the path toward the destination
- E、all interfaces through which the packets can be routed
- F、type of service and precedence in the IP packets
相关考题:
A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?() A. routing tableB. forwarding tableC. routing protocolD. neighbor or peer
Which two statements are true regarding routing policy processing?() A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.
You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets
Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?() A. Confirm if there are other problematic route - map statements that precede divert.B. Check the access list for log hits.C. Check the routing table for 212.50.185.126.D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)
What two situations could require the use of multiple routing protocols? () A. when all equipment is manufactured by CiscoB. when there are multiple paths to destination networksC. because having multiple routing protocols confuses hackersD. when migrating from an older Interior Gateway Protocol (IGP) to a new IGPE. when using UNIX host - based routersF. when smaller broadcast domains are desired
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
What two situations could require the use of multiple routing protocols? ()A、when all equipment is manufactured by CiscoB、when there are multiple paths to destination networksC、because having multiple routing protocols confuses hackersD、when migrating from an older Interior Gateway Protocol (IGP) to a new IGPE、when using UNIX host - based routersF、when smaller broadcast domains are desired
A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN
A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN
When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.
When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()A、 algorithm = failoverB、 algorithm = round_robinC、 reserve_policy = no_reserveD、 reserve_policy = single_path
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A policy based routing (PBR)B unicast reverse path forwarding (uRPF)C lock and keyACLD RFC 1918filteringE IP source routing
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified
单选题When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()Arouting tableBforwarding tableCrouting protocolDneighbor or peer
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified
单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN
单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()AEnd systemBProtocolCApplicationDThroughput
多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets
单选题When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()A algorithm = failoverB algorithm = round_robinC reserve_policy = no_reserveD reserve_policy = single_path
多选题Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()APackets entering F0/0 will be compared based on the PBR route map.BPackets exiting F0/0 will be compared based on the PBR route map.CIOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.DIOS ignores the PBR forwarding directions when the packet matches a route map permit clause.
多选题Which two statements are true regarding routing policy processing?()AThe Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.BPolicies are evaluated from right to left as displayed in the Junos OS configuration file.CPolices are evaluated based on the order in which they are applied to a routing protocol.DPolicy processing stops once the last statement in the policy is evaluated.