When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the

题目

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

  • A、all interfaces in the path toward the destination
  • B、all networks in the path toward the destination
  • C、adjacent next hop router in the path toward the destination
  • D、all routers in the path toward the destination
  • E、all interfaces through which the packets can be routed
  • F、type of service and precedence in the IP packets

相似考题
更多“When policy - based routing (PBR”相关问题
  • 第1题:

    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

    A. all interfaces in the path toward the destination

    B. all networks in the path toward the destination

    C. adjacent next hop router in the path toward the destination

    D. all routers in the path toward the destination

    E. all interfaces through which the packets can be routed

    F. type of service and precedence in the IP packets


    参考答案:C, E, F

  • 第2题:

    What two situations could require the use of multiple routing protocols? ()

    A. when all equipment is manufactured by Cisco

    B. when there are multiple paths to destination networks

    C. because having multiple routing protocols confuses hackers

    D. when migrating from an older Interior Gateway Protocol (IGP) to a new IGP

    E. when using UNIX host - based routers

    F. when smaller broadcast domains are desired


    参考答案:D, E

  • 第3题:

    What two situations could require the use of multiple routing protocols? ()

    • A、when all equipment is manufactured by Cisco
    • B、when there are multiple paths to destination networks
    • C、because having multiple routing protocols confuses hackers
    • D、when migrating from an older Interior Gateway Protocol (IGP) to a new IGP
    • E、when  using UNIX host - based routers
    • F、when smaller broadcast domains are desired

    正确答案:D,E

  • 第4题:

    A policy-based IPsec VPN is ideal for which scenario?()

    • A、when you want to conserve tunnel resources
    • B、when the remote peer is a dialup or remote access client
    • C、when you want to configure a tunnel policy with an action of deny
    • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

    正确答案:B

  • 第5题:

    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()

    • A、A route-based VPN generally uses less resources than a policy-based VPN.
    • B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
    • C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
    • D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

    正确答案:A

  • 第6题:

    Which two statements are true regarding routing policy processing?()

    • A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
    • B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.
    • C、Polices are evaluated based on the order in which they are applied to a routing protocol.
    • D、Policy processing stops once the last statement in the policy is evaluated.

    正确答案:A,C

  • 第7题:

    单选题
    Which of the following is the most effective technique to prevent source IPAddress spoofing?()
    A

     policy based routing (PBR)

    B

     unicast reverse path forwarding (uRPF)

    C

     lock and keyACL

    D

     RFC 1918filtering

    E

     IP source routing


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()
    A

    routing table

    B

    forwarding table

    C

    routing protocol

    D

    neighbor or peer


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
    A

    A route-based VPN generally uses less resources than a policy-based VPN.

    B

    A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.

    C

    A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.

    D

    A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()
    A

    End system

    B

    Protocol

    C

    Application

    D

    Throughput


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()
    A

     algorithm = failover

    B

     algorithm = round_robin

    C

     reserve_policy = no_reserve

    D

     reserve_policy = single_path


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding routing policy processing?()
    A

    The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.

    B

    Policies are evaluated from right to left as displayed in the Junos OS configuration file.

    C

    Polices are evaluated based on the order in which they are applied to a routing protocol.

    D

    Policy processing stops once the last statement in the policy is evaluated.


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?()

    A. Confirm if there are other problematic route - map statements that precede divert.

    B. Check the access list for log hits.

    C. Check the routing table for 212.50.185.126.

    D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)


    参考答案:B

  • 第14题:

    Which of the following is the most effective technique to prevent source IPAddress spoofing?()

    • A、 policy based routing (PBR)
    • B、 unicast reverse path forwarding (uRPF)
    • C、 lock and keyACL
    • D、 RFC 1918filtering
    • E、 IP source routing

    正确答案:B

  • 第15题:

    A route-based VPN is required for which scenario? ()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol such as OSPF is required across the VPN

    正确答案:D

  • 第16题:

    When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()

    • A、routing table
    • B、forwarding table
    • C、routing protocol
    • D、neighbor or peer

    正确答案:A

  • 第17题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第18题:

    When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()

    • A、 algorithm = failover
    • B、 algorithm = round_robin
    • C、 reserve_policy = no_reserve
    • D、 reserve_policy = single_path

    正确答案:C

  • 第19题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()
    A

    The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabled

    B

    Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

    Backup optimization is permanently disabled

    D

    Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()
    A

     The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabled

    B

     Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

     Backup optimization is permanently disabled

    D

     Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A policy-based IPsec VPN is ideal for which scenario?()
    A

    when you want to conserve tunnel resources

    B

    when the remote peer is a dialup or remote access client

    C

    when you want to configure a tunnel policy with an action of deny

    D

    when a dynamic routing protocol such as OSPF must be sent across the VPN


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
    A

    all interfaces in the path toward the destination

    B

    all networks in the path toward the destination

    C

    adjacent next hop router in the path toward the destination

    D

    all routers in the path toward the destination

    E

    all interfaces through which the packets can be routed

    F

    type of service and precedence in the IP packets


    正确答案: F,C
    解析: 暂无解析

  • 第23题:

    多选题
    Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()
    A

    Packets entering F0/0 will be compared based on the PBR route map.

    B

    Packets exiting F0/0 will be compared based on the PBR route map.

    C

    IOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.

    D

    IOS ignores the PBR forwarding directions when the packet matches a route map permit clause.


    正确答案: D,B
    解析: 暂无解析