The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
The map prohibits the redistribution of all type 2 external OSPF routes
The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
The map prohibits the redistribution of all external OSPF routes with tag 6 set
All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
The map permits the redistribution of all type 1 external OSPF routes
第1题:

A. Confirm if there are other problematic route - map statements that precede divert.
B. Check the access list for log hits.
C. Check the routing table for 212.50.185.126.
D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)
第2题:

A. The map prohibits th e redistribution of all type 2 external OSPF routes.
B. All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8.
C. The map prohibits the redistribution of all external OSPF routes with tag 6 set.
D. Th e map permits the redistribution of all type 1 external OSPF routes.
E. The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values?0000, 1000, 255, 1, and 1500.
F. The map prohibits the redistribution of all ty pe 2 external OSPF routes with tag 6 set.
第3题:

A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.
第4题:

A.255.255.255.0
B.255.255.254.0
C.255.255.252.0
D.255.255.248.0
第5题:

A.10.0.0.0
B.10.0.0.254
C.192.223.129.0
D.192.223.129.254
第6题:
Refer to the exhibit. What are three of the basic components of a VoIP network?()
第7题:
Which three authentication options does IS-IS support?()
第8题:
Which three statements accurately describe IOS Firewall configurations?()
第9题:
As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.
Remote access management of this switch will not be possible without configuration change.
More VLANs will need to be created for this switch.
The switch will need a different IOS code in order to support VLANs and STP.
第10题:
A device is trusted if it correctly classifies packets.
A device is trusted if it correctly declassifies packets.
The outermost trusted devices represent the trust boundary.
Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.
Network trust boundaries are automatically configured in IOS version 12.3 and later.
For scalability, classification should be done as close to the edge as possible.
第11题:
The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
The map prohibits the redistribution of all type 2 external OSPF routes
The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
The map prohibits the redistribution of all external OSPF routes with tag 6 set
All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
The map permits the redistribution of all type 1 external OSPF routes
第12题:
ip dhcp pool Client
network 10.1.1.0 255.255.255.240
default-router 10.1.1.1
dns-server 10.2.2.2
domain-name cisco.com
option 150 ip 10.3.3.3
第13题:

A.The router is in area 49.0001.0002
B.The router acts as a Level 1 - 2 router
C.CLNS routing is enable d for the router
D.The router has a system ID of 0003.0004
E.The interfaces have a functional IS - IS configuration
F.The network service access point selector (NSEL) byte has a value of 0
第14题:

A. The peer group shortens the EBGP configuration
B. The peer group shortens the IBGP configuration
C. All the configured neighbors are in autonomous system 100
D. Three AS - path filters are applied to each BGP neighbor
E. Only the outgoing filters are applied to BGP updates
第15题:

A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.
第16题:

A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.
第17题:
For the following statements, which one is the strongest symmetrical encryption algorithm?()
第18题:
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
第19题:
Which three statements are valid SDM configuration wizards? ()
第20题:
All six routes will be installed in the routing table.
Two routes will be installed in the routing table.
Four routes will be installed in the routing table.
All the routes were redistributed into BGP from an IGP.
All the routes were originated by BGP with the network command.
第21题:
With a network wide mask of 255.255.255.128, each interface does not require an IP address.
With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
With a network wide mask of 255.255.254.0, each interface does not require an IP address.
第22题:
All six routes will be installed in the routing table
Two routes will be installed in the routing table
Four routes will be installed in the routing table
All the routes were redistributed into BGP from an IGP
All the routes were originated by BGP with the network command
第23题:
software voice applications
multipoint control unit (MCU)
gatekeeper
call agent
interactive voice response (IVR) systems
softphones
第24题:
Router A is responsible for answering ARP requests sent to the virtual IP address.
If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
If another router were added to this GLBP group, there would be two backup AVGs
Router B is in GLBP listen state.
Router A alternately responds to ARP requests with different virtual MAC addresses.
Router B will transition from blocking state to forwarding state when it becomes the AVG