单选题Unicast Reverse Path Forwarding can perform all of these actions except which one?()A examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were 

题目
单选题
Unicast Reverse Path Forwarding can perform all of these actions except which one?()
A

examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were received

B

check to see if any packet received at a router interface arrives on the best return path

C

combine with a configured ACL

D

log its events,if you specify the logging options for the ACL entries used by the unicast rpf command

E

inspect IP packets encapsulated in tunnels, such as GRE


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“Unicast Reverse Path Forwarding can perform all of these act”相关问题
  • 第1题:

    Which of the following is the most effective technique to prevent source IPAddress spoofing?()

    • A、 policy based routing (PBR)
    • B、 unicast reverse path forwarding (uRPF)
    • C、 lock and keyACL
    • D、 RFC 1918filtering
    • E、 IP source routing

    正确答案:B

  • 第2题:

    Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:()

    • A、Express mode
    • B、Strict mode
    • C、Loose mode
    • D、Tunnel mode
    • E、Safe mode

    正确答案:B,C

  • 第3题:

    Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()

    • A、It is applied only on the input interface of a router.
    • B、It is applied only on the output interface of a router.
    • C、It can be configured either on the input or output interface of a router.
    • D、It cannot be configured on a router interface.
    • E、It is configured under any routing protocol process.

    正确答案:A

  • 第4题:

    what is RPF( Reverse Path Forwarding )?


    正确答案:Forwarding multicast traffic away from the source, rather than to the receiver, is called Reverse Path Forwarding (RPF). This RPF check helps to guarantee that the distribution tree will be loop-free.

  • 第5题:

    Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()

    • A、 ISR can perform the functions of a multipoint control unit to facilitate voice conferencing.
    • B、 ISR can perform the function of a call agent in the event of loss of communication with a CallManager.
    • C、 ISR can provide XML applications to the phones.
    • D、 ISR can provide all of the functionality of a CallManager in the event of loss ofcommunication to the CallManager.
    • E、 ISR can act as a voice gateway to the PSTN.

    正确答案:B,E

  • 第6题:

    Which of the following IOS features can prevent IP spoofing attacks?()

    • A、PPP over Ethernet
    • B、Cisco Express forwarding
    • C、MPLS traffic Engineering
    • D、IS-IS routing
    • E、Unicast Reverse Path Forwarding(uRPF)

    正确答案:E

  • 第7题:

    What is the purpose of unicast reverse path forwarding?()

    • A、to validate packet receipt on interfaces where the traffic should be received
    • B、to forward packets out the interfaces where the traffic should be received
    • C、to forward packets out the interfaces where the traffic should be sent
    • D、to validate packet receipt on interfaces where the traffic should be sent

    正确答案:A

  • 第8题:

    单选题
    Which of the following is the most effective technique to prevent source IPAddress spoofing?()
    A

     policy based routing (PBR)

    B

     unicast reverse path forwarding (uRPF)

    C

     lock and keyACL

    D

     RFC 1918filtering

    E

     IP source routing


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()
    A

    ip verify unicast source reachable-via any

    B

    ip verify unicast reverse-path

    C

    ip verify unicast reverse-path loose

    D

    ip verify unicast reverse-path strict


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following IOS features can prevent IP spoofing attacks?()
    A

    PPP over Ethernet

    B

    Cisco Express forwarding

    C

    MPLS traffic Engineering

    D

    IS-IS routing

    E

    Unicast Reverse Path Forwarding(uRPF)


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()
    A

     The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.

    B

     The AED is responsible for load balancing all traffic for all VLANs across the transport network.

    C

     The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.

    D

     The AED is responsible for MAC address dispute contention for a given VLAN.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    问答题
    what is RPF( Reverse Path Forwarding )?

    正确答案: Forwarding multicast traffic away from the source, rather than to the receiver, is called Reverse Path Forwarding (RPF). This RPF check helps to guarantee that the distribution tree will be loop-free.
    解析: 暂无解析

  • 第13题:

    Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()

    • A、 The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
    • B、 The AED is responsible for load balancing all traffic for all VLANs across the transport network.
    • C、 The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
    • D、 The AED is responsible for MAC address dispute contention for a given VLAN.

    正确答案:C

  • 第14题:

    Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()

    • A、It is used in multihome network scenarios.
    • B、It can be used with BGP to mitigate DoS and DDoS.
    • C、It does not need to have CEF enabled.
    • D、It is enabled via the interface level command ip verify unicast reverse-path.
    • E、It cannot be used with "classification" access lists.

    正确答案:A,B

  • 第15题:

    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

    • A、all interfaces in the path toward the destination
    • B、all networks in the path toward the destination
    • C、adjacent next hop router in the path toward the destination
    • D、all routers in the path toward the destination
    • E、all interfaces through which the packets can be routed
    • F、type of service and precedence in the IP packets

    正确答案:C,E,F

  • 第16题:

    What Cisco technology protects against Spanning-Tree Protocol manipulation?()

    • A、 Spanning tree protect
    • B、 Root Guard and BPDU Guard
    • C、 Unicast Reverse Path Forwarding
    • D、 MAC spoof guard
    • E、 Port Security

    正确答案:B

  • 第17题:

    For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?()

    • A、ip verify unicast source reachable-via any
    • B、ip verify unicast reverse-path
    • C、ip verify unicast reverse-path loose
    • D、ip verify unicast reverse-path strict

    正确答案:A

  • 第18题:

    Unicast Reverse Path Forwarding can perform all of these actions except which one?()

    • A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were received
    • B、check to see if any packet received at a router interface arrives on the best return path
    • C、combine with a configured ACL
    • D、log its events,if you specify the logging options for the ACL entries used by the unicast rpf command
    • E、inspect IP packets encapsulated in tunnels, such as GRE

    正确答案:E

  • 第19题:

    What is one of the uses of MBGP routes?()

    • A、DVMRP hold-time period
    • B、Rendezvous point election
    • C、reverse path forwarding checks
    • D、interdomain multicast next hops

    正确答案:C

  • 第20题:

    多选题
    Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:()
    A

    Express mode

    B

    Strict mode

    C

    Loose mode

    D

    Tunnel mode

    E

    Safe mode


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    单选题
    Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()
    A

    ip sa-validate

    B

    ip split-horizon

    C

    ip access-routes

    D

    ip filter-options


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
    A

    It is applied only on the input interface of a router.

    B

    It is applied only on the output interface of a router.

    C

    It can be configured either on the input or output interface of a router.

    D

    It cannot be configured on a router interface.

    E

    It is configured under any routing protocol process.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    What Cisco technology protects against Spanning-Tree Protocol manipulation?()
    A

     Spanning tree protect

    B

     Root Guard and BPDU Guard

    C

     Unicast Reverse Path Forwarding

    D

     MAC spoof guard

    E

     Port Security


    正确答案: E
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()
    A

    It is used in multihome network scenarios.

    B

    It can be used with BGP to mitigate DoS and DDoS.

    C

    It does not need to have CEF enabled.

    D

    It is enabled via the interface level command ip verify unicast reverse-path.

    E

    It cannot be used with classification access lists.


    正确答案: C,A
    解析: 暂无解析