filter
forward
next-hop
next-interface
第1题:
A.as-path-filter
B.Ip-prefix
C.route-policy
D.policy-based-route
第2题:
A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()
第3题:
Which statement best describes the Turbo ACL feature? ()
第4题:
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
第5题:
Which action occurs when the policy main-policy evaluates the BGP route 10.0.55.2/32?() [edit policy-options] policy-statement test { from { route-filter10.0.0.016/orlongeraccept; route-filter10.0.67.0/24orlangerreject; route-filter10.0.0.0/8orlanger; } then { metric10; community add no-advertise; accept; } } policy-statement main-policy { term only-want-certain-routes { from { policytest; } then { communityadd harry-402; accept; } } } communityno advertise members no-advertise; communityharry-402 members 666:402; [edit protocols] bgp { exportmain-policy; }
第6题:
If the PFE does not have a route to the destination address of a packet, which action will be taken?()
第7题:
forwards the packet
fragments the packet
drops the packet silently
drops the packet and sends an ICMP message
第8题:
It will be filtered due to the deny action in route map clause 10
It will be allowed because of the double negative (two deny references) in clause 10
It will be permitted due to matching clause 20's reference to prefix - list freD
It will be filtered due to matching the implied deny all route map clause at the end of the route map
第9题:
filter
forward
next-hop
next-interface
第10题:
Forward the packet.
Fragment the packet.
Drop the packet silently.
Drop the packet and send an ICMPv6 message.
第11题:
The PFE floods the packet out of all interfaces.
The PFE drops the packet and sends a destination unreachable notification back to source device.
The PFE forwards the packet to the routing engine for furtherprocessing.
The PFE queues the packet and sends are quest for a layer3 lookup to the routing engine.
第12题:
A route-based VPN generally uses less resources than a policy-based VPN.
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
第13题:
How would you characterize the source and type in a denial of service attack on a router?()
第14题:
A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. Which action will the router take?()
第15题:
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()
第16题:
Which two statements about JUNOS Software packet handling are correct?()
第17题:
The policy action of color is used for congestion control under which circumstance?()
第18题:
Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?()
第19题:
mark
color
filter
discard
第20题:
The route is not advertised into BGP
The route is advertised into BGP with community harry-402.
The route is advertised into BGP with community no-advertise.
The route is advertised into BGP with community harry-402 and no-advertise.
第21题:
The Turbo ACL feature processes ACLs into lookup tables for greater efficiency
The Turbo ACL feature leads to increased latency, because the time it takes to match the packet isvariable
The Turbo ACL feature leads to reduced latency, because the time it takes to match the packet is fixedand consistent
Turbo ACLs increase the CPU load by matching the packet to a predetermined list
第22题:
By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underway
By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
第23题:
source IP address and the protocol (such as SSL,HTTPS,SSH)
the packet Time to Live and the source IP address
type of service header and DSCP value
destination IP address
第24题:
congestion in an upstream router
congestion in a downstream router
contention for queue space on an egress interface
contention for queue space on an ingress interface