examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were received
check to see if any packet received at a router interface arrives on the best return path
combine with a configured ACL
log its events,if you specify the logging options for the ACL entries used by the unicast rpf command
inspect IP packets encapsulated in tunnels, such as GRE
第1题:
Which of the following is the most effective technique to prevent source IPAddress spoofing?()
第2题:
Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:()
第3题:
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
第4题:
what is RPF( Reverse Path Forwarding )?
第5题:
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
第6题:
Which of the following IOS features can prevent IP spoofing attacks?()
第7题:
What is the purpose of unicast reverse path forwarding?()
第8题:
policy based routing (PBR)
unicast reverse path forwarding (uRPF)
lock and keyACL
RFC 1918filtering
IP source routing
第9题:
ip verify unicast source reachable-via any
ip verify unicast reverse-path
ip verify unicast reverse-path loose
ip verify unicast reverse-path strict
第10题:
PPP over Ethernet
Cisco Express forwarding
MPLS traffic Engineering
IS-IS routing
Unicast Reverse Path Forwarding(uRPF)
第11题:
The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
The AED is responsible for load balancing all traffic for all VLANs across the transport network.
The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
The AED is responsible for MAC address dispute contention for a given VLAN.
第12题:
第13题:
Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()
第14题:
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()
第15题:
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
第16题:
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
第17题:
For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?()
第18题:
Unicast Reverse Path Forwarding can perform all of these actions except which one?()
第19题:
What is one of the uses of MBGP routes?()
第20题:
Express mode
Strict mode
Loose mode
Tunnel mode
Safe mode
第21题:
ip sa-validate
ip split-horizon
ip access-routes
ip filter-options
第22题:
It is applied only on the input interface of a router.
It is applied only on the output interface of a router.
It can be configured either on the input or output interface of a router.
It cannot be configured on a router interface.
It is configured under any routing protocol process.
第23题:
Spanning tree protect
Root Guard and BPDU Guard
Unicast Reverse Path Forwarding
MAC spoof guard
Port Security
第24题:
It is used in multihome network scenarios.
It can be used with BGP to mitigate DoS and DDoS.
It does not need to have CEF enabled.
It is enabled via the interface level command ip verify unicast reverse-path.
It cannot be used with classification access lists.