Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第1题:
A. Export polices can evaluate only active routes
B. Export polices can evaluate all routes
C. Export polices can be applied to the forwarding table
D. Export polices can be applied to interfaces
第2题:
Which statement about the S-Series native FTP proxy is not true?()
第3题:
Which two statements apply to policy scheduling?() (Choose two.)
第4题:
Which two statements about the Cisco Nexus 1000V VSM are true?()
第5题:
What is true about access control on bridged and routed VLAN traffic?()
第6题:
Which statement is true about import and export routing policies?()
第7题:
By default, which two statements are true about export routing policies?()
第8题:
Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第9题:
It is applied only on the input interface of a router.
It is applied only on the output interface of a router.
It can be configured either on the input or output interface of a router.
It cannot be configured on a router interface.
It is configured under any routing protocol process.
第10题:
FIFO queuing is only appropriate for slower serial interfaces
weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfaces
only one queuing mechanism type can be applied to an interface
weighted fair queuing does not require the configuration of access lists to classify traffic
flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion
第11题:
It polices each individual session to an explicit rate.
It does not police, but never allows link oversubscription.
It polices the aggregate rate of all sessions to an explicit rate.
It does not police, but limits the amount of reservable bandwidth.
第12题:
Import policies concern routes received and determine which routes get put into the routing table.
Export policies concern routes received and determine which routes get put into the routing table.
Export policies are applied before the routing table.
Import polices are applied after the routing table.
第13题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第14题:
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
第15题:
By default, which two statements are true about export routing policies?()
第16题:
What is true about access control on bridged and routed VLAN traffic? ()
第17题:
By default, which two statements are true about export routing polices?()
第18题:
Which two statements are true regarding routing policy processing?()
第19题:
Export policies can evaluate only active routes.
Export policies can evaluate all routes.
Export policies can be applied to the forwarding table.
Export policies can be applied directly to interfaces
第20题:
Router ACLs can be applied to the input and output directions of a VLAN interface
Bridged ACLs can be applied to the input and output directions of a VLAN interface
Only router ACLs can be applied to a VLAN interface
VLAN maps and router ACLs can be used in combination
VLAN maps can be applied to a VLAN interfac
第21题:
Export policies can evaluate only active routes
Export policies can evaluate all routes
Export policies can be applied to the forwarding table
Export policies can be applied directly to interfaces
第22题:
An individual policy can have only one scheduler applied.
You must manually configure system-time updates.
Multiple policies can use the same scheduler.
Policies that do not have schedulers are not active.
第23题:
both active and passive modes FTP are supported
by default the FTP proxy uses port 8021
access polices may apply to native FTP traffic
data loss prevention policies may apply to native FTP traffic
authentication is supported in transparent mode
第24题:
It performs switching decisions and forwarding for the VEM
It can be run on a virtual machine
It can be used for remote VEM switching Iine cards