Refer to the exhibit. On the basis of the information in the exhibit, which two statements are true?()A、When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose2 because of the higher MED value of SanJose2B、The serial 0/0/1 interface on the ISP router has been configured with the set metric 50commandC、The output was generated by entering the show ip bgp command on the SanJose1 routerD、The output was generated by entering the show ip bgp command on the ISP routerE、The serial 0/0/1 interface on the ISP router has been configured with the set metric 75commandF、When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose1 because of the lower MED value of SanJose1

Refer to the exhibit. On the basis of the information in the exhibit, which two statements are true?()

  • A、When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose2 because of the higher MED value of SanJose2
  • B、The serial 0/0/1 interface on the ISP router has been configured with the set metric 50command
  • C、The output was generated by entering the show ip bgp command on the SanJose1 router
  • D、The output was generated by entering the show ip bgp command on the ISP router
  • E、The serial 0/0/1 interface on the ISP router has been configured with the set metric 75command
  • F、When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose1 because of the lower MED value of SanJose1

相关考题:

Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?() A. The traffic will be rejected.B. The traffic will be dropped.C. The traffic will be forwarded.D. The traffic will be policed.

The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()A. 24.9%, 980B. 6.94%, 980C. 69.4%, 35D. cannot be determined from this outputE. 69.4%, 4061

Refer to the exhibit. You want to use all the routes in the EIGRP topology for IP load balancing. Which two EIGRP subcommands wou ld you use to accomplish this goal?() A. traffic - share balancedB. distanceC. maximum- pathsD. default - networkE. variance

Refer to the exhibit. A company would prefer all Internet - bound OSPF routed traffic to use ISP ABC with ISP DEF as a backup. As the network consultant, what three configuration changes might you make?()A. The default -information originate command should be configured on router B1 and B4.B. The default -information originate command should be configured on router B2 and B3.C. If the metric value for ISP ABC is set at the default, the I SP DEF metric value should be set to 1.D. If the metric value for ISP ABC is set at the default, the ISP DEF metric value should be set to 25.E. The metric type value should be set to type 1.F. The metric type value should be set to type 2.

Refer to the exhibit. Which statement is true? () A. Only traffic with a destination from 10.10.0.0/19 will be permitted.B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.C. Only traffic going to 10.10.0.0/19 will be permitted.D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.

Refer to the exhibit. Network 10.0.0.0/8 is being advertised to autonomous system 65550 via both external links. Which statement about the preferred path to the 10.0.0.0/8 network is true? () A. Router R2 will be preferred because it has the higher neighbor IP address.B. Router R2 will be preferr ed because its neighbor has a lower autonomous system number.C. Router R1 will be preferred because it has a lower local preference.D. Router R2 will be preferred because it has a higher local preference.E. Router R1 will be preferred because its nei ghbor has the higher autonomous system number.F. Router R1 will be preferred because it has the lower neighbor IP address.

Refer to the exhibit. Which two statements are true about the partial configuration that is provided.() A. The peer group shortens the EBGP configurationB. The peer group shortens the IBGP configurationC. All the configured neighbors are in autonomous system 100D. Three AS - path filters are applied to each BGP neighborE. Only the outgoing filters are applied to BGP updates

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.

Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?() A.Traffic will be dropped per line 30 of the ACL.B.Traffic will be accepted per line 40 of the ACL.C.Traffic will be dropped, because of the implicit deny all at the end of the ACL.D.Traffic will be accepted, because the source address is not covered by the ACL.

Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

Which two statements about the bgp deterministic-med and bgp always-compare-med commands are true?()A、The bgp deterministic-med command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path lengthB、The bgp always-compare command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path systemC、Enabling the bgp deterministic-med command ensures the comparison of the MED variable when choosing routes advertised by different peers in the same autonomous system.D、Enabling the bgp always-compare-med command ensures the comparison of the MED variable for paths from neighbors in different autonomous systems.E、The bgp deterministic-med and bgp always-compare-med commands are enabled by defult.

You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office.  Which  three statements are true about the voice VLAN feature on this switch?()A、The default CoS value for incoming traffic is set up to 0.B、The CoS value is trusted for 802.1p or 802.1q tagged traffic.C、PortFast is automatically disabled when a voice VLAN is configured.D、The voice VLAN feature is disabled by default.E、The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.F、When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which two statements are true when source/destination filters are enabled? ()(Choose two.)A、Excluded traffic is not accelerated.B、Excluded traffic is only compressed.C、Source/destination filter applies to all traffic sent from LAN to WAN.D、Source/destination filters work in packet interception mode using RIPv2.

Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  A、 The CoS value is trusted for 802.1p or 802.1q tagged traffic.B、 The voice VLAN feature is disabled by default.C、 The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.D、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.E、 PortFast is automatically disabled when a voice VLAN is configured.F、 The default CoS value for incoming traffic is set to 0.

Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

多选题Refer to the exhibit. On the basis of the information in the exhibit, which two statements are true?()AWhen traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose2 because of the higher MED value of SanJose2BThe serial 0/0/1 interface on the ISP router has been configured with the set metric 50commandCThe output was generated by entering the show ip bgp command on the SanJose1 routerDThe output was generated by entering the show ip bgp command on the ISP routerEThe serial 0/0/1 interface on the ISP router has been configured with the set metric 75commandFWhen traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose1 because of the lower MED value of SanJose1

多选题Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()AThe CoS value is trusted for 802.1p or 802.1q tagged traffic.BThe voice VLAN feature is disabled by default.CThe IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.DWhen the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.EPortFast is automatically disabled when a voice VLAN is configured.FThe default CoS value for incoming traffic is set to 0.

多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.