Which two statements describe the advantages to the use of RIP over the use of OSPF?() A.RIP requires less time to convergeB.RIP uses less bandwidthC.RIP is less complex to configureD.RIP demands fewer router resourcesE.RIP has a more accurate metric

Which two statements describe the advantages to the use of RIP over the use of OSPF?()

A.RIP requires less time to converge

B.RIP uses less bandwidth

C.RIP is less complex to configure

D.RIP demands fewer router resources

E.RIP has a more accurate metric


相关考题:

Which two statements about the use of SCREEN options are correct? ()(Choose two.) A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF

Referring to the exhibit, which two statements are true?() A. The route 192.168.1.0/25 is acceptedB. The route 192.168.2.0/24 is acceptedC. OSPF routes will be exported into RIPD. RIP routes will be exported into OSPF

Which statements are true regarding classless routing protocols?() A. The use of discontiguous subnets is not allowedB. The use of variable length subnet masks is permittedC. RIP v1 is a classless routing protocolD. IGRP supports classless routing within the same autonomous systemE. RIP v2 supports classless routing

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

Which two statements are true about IS -IS routing?()A、Based on the default timers, OSPF d etects a failure faster than IS - IS does.B、OSPF default timers permit more tuning than IS - IS does.C、IS - IS is more efficient than OSPF in the use of CPU resources.D、OSPF is more scalable than IS - IS because of its ability to identify normal, stub, an d NSSA areas.E、IS - IS and OSPF are both Open Standard, link - state routing protocols which support VLSM.

Which two statements about route redistribution when implementing OSPF are true?()A、Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.B、OSPF can import routes learned using EIGRP, RIP, and IS - IS.C、OSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.D、At the interdomain level, OSPF cannot import routes learned using BGP.E、OSPF routes can be exported into BGP.

Which two statements are correct regarding default protocol preference values?()A、RIP is preferred over OSPF external routes.B、Direct, local, and static routes have the same preference value.C、OSPF's preference value is lower than BGP.D、OSPF has a single preference value for both internal and external routes.

Which two protocols use UDP as a transport protocol by default?()A、TelnetB、ICMPC、DHCPD、RIP

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、 Never use passive interfaces.B、 Use NSSA areas from the core down.C、 Use totally stub areas to stop type 3 LSAs.D、 Use the lowest Ethernet interface IP address as the router ID.E、 Tune OSPF timers to enable OSPF to achieve quicker convergence

Which two statements describe the advantages to the use of RIP over the use of OSPF?()A、RIP requires less time to convergeB、RIP uses less bandwidthC、RIP is less complex to configureD、RIP demands fewer router resourcesE、RIP has a more accurate metric

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

Which statements are true regarding classless routing protocols?()A、The use of discontiguous subnets is not allowedB、The use of variable length subnet masks is permittedC、RIP v1 is a classless routing protocolD、IGRP supports classless routing within the same autonomous systemE、RIP v2 supports classless routing

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、Never use passive interfaces.B、Use NSSA areas from the core down.C、Use totally stub areas to stop type 3 LSAs.D、Use the lowest Ethernet interface IP address as the router ID.E、Tune OSPF timers to enable OSPF to achieve quicker convergence.

Which two statements about OSPF IPv6 routing are true?()A、It requires OSPF version 3.B、automatically detects neighbors over NHMA interfacesC、It supports encryption usingD、It uses LSA type 9E、It uses LSA type 8

Which of the following is a diplexer used for?()A、Allows two satellite tuners to use the same dish.B、Connects the low noise block down converter (LNB) to the multi-switch.C、Combines satellite and over the air (OTA) signals.D、Allows one LNB to use two satellites.

Which two statements are correct regarding the default protocol preference values? ()A、RIP is preferred over OSPF external routesB、Direct, local and static routes have the same preference valueC、OSPF's preference value is lower than BGPD、OSPF has a single preference value for both internal and external routes

Which two statements are correct regarding default protocol preference values?()A、OSPF has a single preference value for both internal and external routes.B、RIP is preferred over OSPF external routes.C、Direct, local, and static routes have the same preference value.D、OSPF's preference value is lower than BGP (both IBGP and EBGP).

多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric

多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider

多选题Which two commands would you use to view OSPF routes?()Ashow ip route ospfBshow ospf routesCshow route protocol ospfDshow route

多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF

多选题Which two statements are true about IS -IS routing?()ABased on the default timers, OSPF d etects a failure faster than IS - IS does.BOSPF default timers permit more tuning than IS - IS does.CIS - IS is more efficient than OSPF in the use of CPU resources.DOSPF is more scalable than IS - IS because of its ability to identify normal, stub, an d NSSA areas.EIS - IS and OSPF are both Open Standard, link - state routing protocols which support VLSM.