Which two statements about the EIGRP DUAL process are correct?() A. An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.B. An EIGRP route will go passive if there are no successors in the EIGRP topology table.C. DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.D. A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.E. The stuck in active state is caused when the wait for the query replies have timed out.F. EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

Which two statements about the EIGRP DUAL process are correct?()

A. An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.

B. An EIGRP route will go passive if there are no successors in the EIGRP topology table.

C. DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.

D. A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.

E. The stuck in active state is caused when the wait for the query replies have timed out.

F. EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.


相关考题:

Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above

Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.) A. In the DH key exchange process, the session key is never passed across the network.B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

Which three statements are correct about Rate Limiters? ()(Choose three.) A. one-rate rate limitersB. two-rate rate limitersC. two-rate rate limiters is the defaultD. one-rate rate limiters is the defaultE. there is no default it must be configured

Which three statements about EIGRP are true?() A.EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.B.EIGRP uses a hello protocol to establish neighbor relationshipsC.EIGRP uses split horizon and reverse poisoning to avoid routing loops.D.EIGRP uses periodic updates to exchange routing informationE.EIGRP allows routers of different manufacturers to interoperateF.EIGRP supports VLSM and authentication for routing updates.G. EIGRP use a broadcast address to send routing information.

Which two statements about EIGRP are true?()A、EIGRP supports VLSM, route summarization, and routing update authentication.B、If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.C、Passive routes are in the process of being calculated by DUAL.D、EIGRP exchanges full routing table information with neighboring routers with every update.E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

Which two statements about the EIGRP DUAL process are correct?()A、An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.B、An EIGRP route will go passive if there are no successors in the EIGRP topology table.C、DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.D、A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.E、The stuck in active state is caused when the wait for the query replies have timed out.F、EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

Which statements are true about EIGRP successor routes? ()A、A successor route is used by EIGRP to forward traffic to a destination.B、Successor routes are saved in the topology table to be used if the primary route fails.C、Successor routes are flagged as "active" in the routing table.D、A successor route may be backed up by a feasible successor route.E、Successor routes are stored in the neighbor table following the discovery process.

Which of the following are correct statements?()A、EIGRP advertises the best routes to its neighborB、EIGRP uses "cost" to determine best pathC、EIGRP allows unequal cost load balancingD、OSPF requires neighbor adjacencies before updates are sentE、EIGRP advertises all routes to its neighborF、OSPF allows unequal cost load balancing

Which two statements about layer 3 access designs are correct?()A、 IP address space is difficult to manage.B、 Broadcast and fault domains arc increasedC、 Convergence time is fractionally slower than STPD、 Limits on clustering and NIC teaming are removedE、 Fast uplink convergence is supported tor failover and fallback

Which two statements are true regarding EIGRP?()A、Passive routes are in the process of being calculated by DUAL.B、EIGRP supports VLSM,route summarization,and routing update authentication.C、EIGRP exchanges full routing table information with neighboring routers with every update.D、If the feasible successor has a higher advertised distance than the successor route,it becomes theprimary route.E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

Which statements are true about EIGRP successor routes (Choose two.)()。A、A successor route is used by EIGRP to forward traffic to a destination.B、Successor routes are saved in the topology table to be used if the primary route fails.C、Successor routes are flagged as "active" in the routing table.D、A successor route may be backed up by a feasible successor route.E、Successor routes are stored in the neighbor table following the discovery process.

Which three statements about EIGRP are true?()A、EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.B、EIGRP uses a hello protocol to establish neighbor relationshipsC、EIGRP uses split horizon and reverse poisoning to avoid routing loops.D、EIGRP uses periodic updates to exchange routing informationE、EIGRP allows routers of different manufacturers to interoperateF、EIGRP supports VLSM and authentication for routing updates.G、EIGRP use a broadcast address to send routing information.

Which two statements about the configuration of the switch interface are correct (Choose two)()。A、The switchport belongs only to VLAN 2B、Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2C、The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2D、A network host can be connected to this interface

Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets (Choose two.)()。A、neighbor tableB、SPF tableC、RTP tableD、topology tableE、query tableF、DUAL table

Which two statements about Network Attached Storage are correct?()A、Data is accessed using NFS or CIFS.B、Data is accessed at the block level.C、NAS is referred to as captive storage.D、Storage devices can be shared between users.E、A NAS implementation is not as fast as a DAS implementation.

Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destinationB、The forwarding table constains only active routesC、The forwarding table is used to process transit packetsD、The forwarding table is stored in compact flash

Which three statements are correct about Rate Limiters? ()(Choose three.)A、one-rate rate limitersB、two-rate rate limitersC、two-rate rate limiters is the defaultD、one-rate rate limiters is the defaultE、there is no default it must be configured

Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()A、In the DH key exchange process, the session key is never passed across the network.B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destination.B、The forwarding table contains only active routes.C、The forwarding table is used to process transit packets.D、The forwarding table is stored in compact flash

多选题Which two statements about layer 3 access designs are correct?()AIP address space is difficult to manage.BBroadcast and fault domains arc increasedCConvergence time is fractionally slower than STPDLimits on clustering and NIC teaming are removedEFast uplink convergence is supported tor failover and fallback

多选题Which two statements about EIGRP are true?()AEIGRP supports VLSM, route summarization, and routing update authentication.BIf the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.CPassive routes are in the process of being calculated by DUAL.DEIGRP exchanges full routing table information with neighboring routers with every update.EA query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

多选题Which two statements about the EIGRP DUAL process are correct?()AAn EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.BAn EIGRP route will go passive if there are no successors in the EIGRP topology table.CDUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.DA feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.EThe stuck in active state is caused when the wait for the query replies have timed out.FEIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

多选题Which statements are true about EIGRP successor routes?()AA successor route is used by EIGRP to forward traffic to a destination.BSuccessor routes are saved in the topology table to be used if the primary route fails.CSuccessor routes are flagged as active in the routing table.DA successor route may be backed up by a feasible successor route.ESuccessor routes are stored in the neighbor table following the discovery process.FSuccessors are not used in EIGRP.

多选题Which two statements are true regarding EIGRP?()APassive routes are in the process of being calculated by DUAL.BEIGRP supports VLSM, route summarization, and routing update authentication.CEIGRP exchanges full routing table information with neighboring routers with every update.DIf the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.EA query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF

多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destinationBThe forwarding table constains only active routesCThe forwarding table is used to process transit packetsDThe forwarding table is stored in compact flash