多选题Which three options are valid ways to filter routes from a BGP peer?()Afilter-listBinbound ACLCroute-mapDoutbound ACLEprefix-listFneighbor 10.0.0.1 deny-map my-map command

多选题
Which three options are valid ways to filter routes from a BGP peer?()
A

filter-list

B

inbound ACL

C

route-map

D

outbound ACL

E

prefix-list

F

neighbor 10.0.0.1 deny-map my-map command


参考解析

解析: 暂无解析

相关考题:

Which three advanced permit actions within security policies are valid?() (Choose three.) A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.

Whichactionoccurswhenthepolicymain-policyevaluatestheBGProute10.0.55.2/32?()[editpolicy-options]policy-statementtest{from{route-filter10.0.0.016/orlongeraccept;route-filter10.0.67.0/24orlangerreject;route-filter10.0.0.0/8orlanger;}then{metric10;communityaddno-advertise;accept;}}policy-statementmain-policy{termonly-want-certain-routes{from{policytest;}then{communityaddharry-402;accept;}}}communitynoadvertisemembersno-advertise;communityharry-402members666:402;[editprotocols]bgp{exportmain-policy;}

Which three methods can you use for route discovery on a WX platform? ()(Choose three.) A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server

You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()A. Are the ASBRs trying to redistribute the external routes into a totally stubby area?B. Are the ABRs configured with stubby areas?C. Is the subnets keyword being used with the redistribution command?D. Is backbone area (area 0) contiguous?E. Is the CPU utilization of the routers high?

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?()A. the OSPF routeB. the EIGRP routeC. the RIPv2 routeD. all three routesE. the OSPF and RIPv2 routes

You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()A、Are the ASBRs trying to redistribute the external routes into a totally stubby area?B、Are the ABRs configured with stubby areas?C、Is the subnets keyword being used with the redistribution command?D、Is backbone area (area 0) contiguous?E、Is the CPU utilization of the routers high?

Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()A、device-specificB、on-premisesC、integratedD、hybridE、virtualF、SaaS

What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)A、The WAN link is down.B、IPSec is enabled on the WX.C、Traceroute is enabled for compression.D、The network is configured using static routes.E、The local and remote cables are accidentally swapped.

Which statement is correct about policies in the Junos OS?()A、Import policies are used to filter routes from the routing table to the forwarding table.B、Import policies are used to filter routes destined for the routing table.C、Import policies are used to filter routes being sent to neighboring devices.D、Import policies are used to filter traffic entering the device.

Which three options are valid WAN connectivity methods? ()A、PPPB、WAPC、HDLCD、MPLSE、L2TPv3F、ATM

Which three options are valid ways to filter routes from a BGP peer?()A、filter-listB、inbound ACLC、route-mapD、outbound ACLE、prefix-listF、neighbor 10.0.0.1 deny-map my-map command

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?()A、the OSPF routeB、the EIGRP routeC、the RIPv2 routeD、all three routesE、the OSPF and RIPv2 routes

Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.

Which statement is correct about policies in the Junos OS?()A、Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.B、Export policies are used to filter routes destined for the routing table.C、Export policies are used to filter routes being sent to neighboring devices.D、Export policies are used to filter traffic leaving the device.

When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A、 Filter versionsB、 Filter loadsC、 Filter tasksD、 Filter options

单选题Which statement is correct about policies in the Junos OS?()AImport policies are used to filter routes from the routing table to the forwarding table.BImport policies are used to filter routes destined for the routing table.CImport policies are used to filter routes being sent to neighboring devices.DImport policies are used to filter traffic entering the device.

多选题Which three methods can you use for route discovery on a WX platform? ()(Choose three.)AEnable RIPBEnable OSPFCPeriodically poll any routerDImport routes from a TFTP server

多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.

多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol static acceptDset protocols rip group internal export demo

多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol staticDset policy-options policy-statement demo

多选题Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()Adevice-specificBon-premisesCintegratedDhybridEvirtualFSaaS

单选题When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A Filter versionsB Filter loadsC Filter tasksD Filter options

多选题Which three options are valid WAN connectivity methods?()APPPBWAPCHDLCDMPLSEL2TPv3FATM

多选题Which two options are valid WAN connectivity methods?()APPPBWAPCDSLDEthernetEL2TPv3

单选题Which statement is correct about policies in the Junos OS?()AExport policies are used to filter routes from the RE forwarding table to the PFE forwarding table.BExport policies are used to filter routes destined for the routing table.CExport policies are used to filter routes being sent to neighboring devices.DExport policies are used to filter traffic leaving the device.