A.ItisusedforPIMcontroltraffic
B.Itisoptionallyconfiguredforahighbandwidthmulticastsourcetoreducemulticasttrafficreplication to uninterestedPErouters
C.WithintheVPFconfigurationinthePErouter,multipleDefaultMDTgroupsareconfiguredsoeach VPFcansupportmultiplemulticastsources
D.ThereisareducedmulticaststateintheMPLScoreProuters
E.Whenmulticasttrafficexceedsacertainconfiguredthreshold,trafficfromtheDataMDTisswitched to theDefaultMDTtoconservebandwidth
第1题:
Refer to the exhibit. You have completed an OSPF implementation, and you are verifying OSPF operation. You notice that router A and router B are stuck in the two - way state. From the show ip ospf interface command output, what is the cause of this issue?()
A. All OSPF implementations must have at le ast one interface in area 0.
B. You are attempting to run in the broadcast mode over an NBMA interface.
C. Both routers are configured to function as a BDR; therefore, there is no DR router.
D. Someone has changed the OSPF router ID; therefore you must clear the OSPF process.
E. The OSPF priority is set to 0 on both routers; therefore neither can become the DR.
第2题:
TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()
第3题:
A.router(config)#
B.router(config-if)#
C.router(config-vrf)#
D.router(config-router)#
E.router(config-router-af)#
第4题:
What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()
第5题:
Which two statements about the implementation of WLAN QoS are true?()
第6题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第7题:
Which two routing interface parameters are supported in OSPF implementations?()
第8题:
Which of the following BEST describes how server virtualization can cut down IT costs? ()
第9题:
VPLS uses LDP for signaling.
VPLS uses BGP for autodiscovery and signaling.
VPLS uses extended IS-IS for signaling
VPLS uses OSPF version 3 for auto discovery and signaling
VPLS uses spanning tree for signaling
第10题:
IP unicast in IP unicast
IP multicast in IP anycast
IP anycast in IP anycast
IP multicast in IP unicast
IP multicast in IP multicast
IP unicast in IP multicast
第11题:
retransmit - interval
de ad - interval
stub area
virtual link
NSSA area
第12题:
They are used to find the best path through a network.
They allow the exchange of filtering tables.
They specify different implementations of the Spanning-Tree Protocol.
They allow the exchange of routing tables
They provide inter-switch VLAN communication.
第13题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第14题:
A.IPunicastinIPunicast
B.IPmulticastinIPanycast
C.IPanycastinIPanycast
D.IPmulticastinIPunicast
E.IPmulticastinIPmulticast
F.IPunicastinIPmulticast
第15题:
Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations. Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()
第16题:
When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?()
第17题:
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
第18题:
What is an advantage of the IntServ QoS model?()
第19题:
What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?()
第20题:
gatekeeper
Call Routing
Call Admission Control
Digital Signal Processors
第21题:
router(config)#
router(config-if)#
router(config-vrf)#
router(config-router)#
router(config-router-af)#
第22题:
It is used for PIM control traffic
It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
There is a reduced multicast state in the MPLS core P routers
When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth
第23题:
The stack bit will only be used when LDP is the label distribution protocol
The label is the last entry in the label stack.
The stack bit is for Cisco implementations exclusively and will only be used when TDP is the label distribution protocol.
The stack bit is reserved for future use.