Which source of routing information is preferred by default?()A、OSPF internalB、OSPF externalC、IS-IS Level 1D、IS-IS Level 2

Which source of routing information is preferred by default?()

  • A、OSPF internal
  • B、OSPF external
  • C、IS-IS Level 1
  • D、IS-IS Level 2

相关考题:

Which routing algorithm is described below?It is a mechanism in which the sending station determines the route the frame. will follow andincludes the routing information with the flame;bridges read the routing information to determineif they should forward the frame.A.Fixed RoutingB.Spanning TreeC.Source RoutingD.Frame. Forwarding

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

Which source of routing information is preferred by default?() A. OSPF internalB. OSPF externalC. IS-IS Level 1D. IS-IS Level 2

Which statement is true about import and export routing policies?() A.Import policies concern routes received and determine which routes get put into the routing table.B.Export policies concern routes received and determine which routes get put into the routing table.C.Export policies are applied before the routing table.D.Import polices are applied after the routing table.

How does route poisoning work with holddown timers to prevent routing loops?() A. Information learned from one source is not distributed back to that source.B. Routing updates from the poisoned source are ignored until a holddown timer expires.C. Failed routes are advertised with infinite metrics.D. New routing updates are ignored until the network has converged.E. A route is marked as unavailable when its time-to-live is exceeded.

what is the routing family which the router has to build map for the routing domain?

利用IP数据包中的一个选项IP Source Routing来指定路由,利用可信用户对服务器进行攻击,这种攻击是()A、源路由选择欺骗(Source Routing Spoofing )B、IP欺骗(IP Spoofing)C、DNS欺骗(DNS Spoofing).D、TCP序列号欺骗

Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing

How does route poisoning work with holddown timers to prevent routing loops?()A、Information learned from one source is not distributed back to that source.B、Routing updates from the poisoned source are ignored until a holddown timer expires.C、Failed routes are advertised with infinite metrics.D、New routing updates are ignored until the network has converged.E、A route is marked as unavailable when its time-to-live is exceeded.

Apart from interdomain multicast routing, what else is MSDP used for?()A、Source Specific Multicast and IGMPv2B、Announcing multicast sources to BGP speakersC、Anycast RPD、Intradomain multicast routing

If the PFE does not have a route to the destination address of a packet, which action will be taken?()A、The PFE floods the packet out of all interfaces.B、The PFE drops the packet and sends a destination unreachable notification back to source device.C、The PFE forwards the packet to the routing engine for further processing.D、The PFE queues the packet and sends a request for a layer 3 lookup to the routing engine.

You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?()A、The bypass-routing parameter is ignored when using private IP addressing.B、The telnet session will have the source IP address 10.10.10.1.C、The telnet session will connect to the neighboring device's interface ge-1/1/0.D、Return traffic for the telnet session might not arrive at interface ge-1/1/0.

Which three methods of source NAT does JUNOS Software support?()A、interface-based source NATB、source NAT with address shiftingC、source NAT using static source poolD、interface-based source NAT without PATE、source NAT with address shifting and PAT

Which of the following are shared distribution tree characteristics? (Choose all that apply.)()A、Memory requirements are higher for shared distribution tree than for source distribution treeB、Creates a tree from a central RP to all last-hop routersC、Uses a rendezvous pointD、An optimal path is created between each source router and each last-hop routerE、Place (S,G) entry in each router’s multicast routing tableF、Place (*,G) entry in a router’s multicast routing to table

Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

Unicast Reverse Path Forwarding can perform all of these actions except which one?()A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB、check to see if any packet received at a router interface arrives on the best return pathC、combine with a configured ACLD、log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE、inspect IP packets encapsulated in tunnels, such as GRE

Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A、source IP address and the protocol (such as SSL,HTTPS,SSH)B、the packet Time to Live and the source IP addressC、type of service header and DSCP valueD、destination IP address

When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set

单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A policy based routing (PBR)B unicast reverse path forwarding (uRPF)C lock and keyACLD RFC 1918filteringE IP source routing

单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A static source poolB interface source poolC source pool with PATD souce pool without PAT

问答题what is the routing family which the router has to build map for the routing domain?

单选题How does route poisoning work with holddown timers to prevent routing loops?()AInformation learned from one source is not distributed back to that source.BRouting updates from the poisoned source are ignored until a holddown timer expires.CFailed routes are advertised with infinite metrics.DNew routing updates are ignored until the network has converged.EA route is marked as unavailable when its time-to-live is exceeded.

单选题If the PFE does not have a route to the destination address of a packet, which action will be taken?()AThe PFE floods the packet out of all interfaces.BThe PFE drops the packet and sends a destination unreachable notification back to source device.CThe PFE forwards the packet to the routing engine for further processing.DThe PFE queues the packet and sends a request for a layer 3 lookup to the routing engine.

单选题You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?()AThe bypass-routing parameter is ignored when using private IP addressing.BThe telnet session will have the source IP address 10.10.10.1.CThe telnet session will connect to the neighboring device's interface ge-1/1/0.DReturn traffic for the telnet session might not arrive at interface ge-1/1/0.

单选题Which source of routing information is preferred by default?()AOSPF internalBOSPF externalCIS-IS Level 1DIS-IS Level 2

单选题Which statement is true about import and export routing policies?()AImport policies concern routes received and determine which routes get put into the routing table.BExport policies concern routes received and determine which routes get put into the routing table.CExport policies are applied before the routing table.DImport polices are applied after the routing table.