Which two statements about the EIGRP DUAL process are correct?()A. An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.B. An EIGRP route will go passive if there are no successors in the EIGRP topolo

题目
Which two statements about the EIGRP DUAL process are correct?()

A. An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.

B. An EIGRP route will go passive if there are no successors in the EIGRP topology table.

C. DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.

D. A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.

E. The stuck in active state is caused when the wait for the query replies have timed out.

F. EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.


相似考题
更多“Which two statements about the EIGRP DUAL process are correct?() ”相关问题
  • 第1题:

    Which two statements about EIGRP are true?()

    • A、EIGRP supports VLSM, route summarization, and routing update authentication.
    • B、If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
    • C、Passive routes are in the process of being calculated by DUAL.
    • D、EIGRP exchanges full routing table information with neighboring routers with every update.
    • E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

    正确答案:A,E

  • 第2题:

    Which statements are true about EIGRP successor routes? ()

    • A、A successor route is used by EIGRP to forward traffic to a destination.
    • B、Successor routes are saved in the topology table to be used if the primary route fails.
    • C、Successor routes are flagged as "active" in the routing table.
    • D、A successor route may be backed up by a feasible successor route.
    • E、Successor routes are stored in the neighbor table following the discovery process.

    正确答案:A,D

  • 第3题:

    Which two statements about layer 3 access designs are correct?()

    • A、 IP address space is difficult to manage.
    • B、 Broadcast and fault domains arc increased
    • C、 Convergence time is fractionally slower than STP
    • D、 Limits on clustering and NIC teaming are removed
    • E、 Fast uplink convergence is supported tor failover and fallback

    正确答案:A,E

  • 第4题:

    Which statements are true about EIGRP successor routes (Choose two.)()。

    • A、A successor route is used by EIGRP to forward traffic to a destination.
    • B、Successor routes are saved in the topology table to be used if the primary route fails.
    • C、Successor routes are flagged as "active" in the routing table.
    • D、A successor route may be backed up by a feasible successor route.
    • E、Successor routes are stored in the neighbor table following the discovery process.

    正确答案:A,D

  • 第5题:

    Which two statements about the configuration of the switch interface are correct (Choose two)()。

    • A、The switchport belongs only to VLAN 2
    • B、Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2
    • C、The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2
    • D、A network host can be connected to this interface

    正确答案:A,D

  • 第6题:

    Which two statements about Network Attached Storage are correct?()

    • A、Data is accessed using NFS or CIFS.
    • B、Data is accessed at the block level.
    • C、NAS is referred to as captive storage.
    • D、Storage devices can be shared between users.
    • E、A NAS implementation is not as fast as a DAS implementation.

    正确答案:C,D

  • 第7题:

    Which three statements are correct about Rate Limiters? ()(Choose three.)

    • A、one-rate rate limiters
    • B、two-rate rate limiters
    • C、two-rate rate limiters is the default
    • D、one-rate rate limiters is the default
    • E、there is no default it must be configured

    正确答案:A,B,C

  • 第8题:

    Which two statements are true about the forwarding table?()

    • A、The forwarding table lists each source protocol and preference for each destination.
    • B、The forwarding table contains only active routes.
    • C、The forwarding table is used to process transit packets.
    • D、The forwarding table is stored in compact flash

    正确答案:B,C

  • 第9题:

    多选题
    Which two statements about EIGRP are true?()
    A

    EIGRP supports VLSM, route summarization, and routing update authentication.

    B

    If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.

    C

    Passive routes are in the process of being calculated by DUAL.

    D

    EIGRP exchanges full routing table information with neighboring routers with every update.

    E

    A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which statements are true about EIGRP successor routes?()
    A

    A successor route is used by EIGRP to forward traffic to a destination.

    B

    Successor routes are saved in the topology table to be used if the primary route fails.

    C

    Successor routes are flagged as active in the routing table.

    D

    A successor route may be backed up by a feasible successor route.

    E

    Successor routes are stored in the neighbor table following the discovery process.

    F

    Successors are not used in EIGRP.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()
    A

    In the DH key exchange process, the session key is never passed across the network.

    B

    In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C

    In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D

    In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements about the use of SCREEN options are correct? ()(Choose two.)
    A

    SCREEN options offer protection against various attacks

    B

    SCREEN options are deployed prior to route and policy processing in first path packet processing

    C

    SCREEN options are deployed at the ingress and egress sides of a packet flow

    D

    SCREEN options, you must take special care to protect OSPF


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Which two statements about the EIGRP DUAL process are correct?()

    • A、An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.
    • B、An EIGRP route will go passive  if there are no successors in the EIGRP topology table.
    • C、DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.
    • D、A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.
    • E、The stuck in active state is caused when the wait for the query replies have timed out.
    • F、EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.

    正确答案:A,E

  • 第14题:

    Which of the following are correct statements?()

    • A、EIGRP advertises the best routes to its neighbor
    • B、EIGRP uses "cost" to determine best path
    • C、EIGRP allows unequal cost load balancing
    • D、OSPF requires neighbor adjacencies before updates are sent
    • E、EIGRP advertises all routes to its neighbor
    • F、OSPF allows unequal cost load balancing

    正确答案:A,C,D

  • 第15题:

    Which two statements are true regarding EIGRP?()

    • A、Passive routes are in the process of being calculated by DUAL.
    • B、EIGRP supports VLSM,route summarization,and routing update authentication.
    • C、EIGRP exchanges full routing table information with neighboring routers with every update.
    • D、If the feasible successor has a higher advertised distance than the successor route,it becomes theprimary route.
    • E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

    正确答案:B,E

  • 第16题:

    Which three statements about EIGRP are true?()

    • A、EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.
    • B、EIGRP uses a hello protocol to establish neighbor relationships
    • C、EIGRP uses split horizon and reverse poisoning to avoid routing loops.
    • D、EIGRP uses periodic updates to exchange routing information
    • E、EIGRP allows routers of different manufacturers to interoperate
    • F、EIGRP supports VLSM and authentication for routing updates.
    • G、EIGRP use a broadcast address to send routing information.

    正确答案:A,B,F

  • 第17题:

    Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets (Choose two.)()。

    • A、neighbor table
    • B、SPF table
    • C、RTP table
    • D、topology table
    • E、query table
    • F、DUAL table

    正确答案:A,D

  • 第18题:

    Which two statements are true about the forwarding table?()

    • A、The forwarding table lists each source protocol and preference for each destination
    • B、The forwarding table constains only active routes
    • C、The forwarding table is used to process transit packets
    • D、The forwarding table is stored in compact flash

    正确答案:B,C

  • 第19题:

    Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()

    • A、In the DH key exchange process, the session key is never passed across the network.
    • B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
    • C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
    • D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

    正确答案:A,B

  • 第20题:

    多选题
    Which two statements about layer 3 access designs are correct?()
    A

    IP address space is difficult to manage.

    B

    Broadcast and fault domains arc increased

    C

    Convergence time is fractionally slower than STP

    D

    Limits on clustering and NIC teaming are removed

    E

    Fast uplink convergence is supported tor failover and fallback


    正确答案: B,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about the EIGRP DUAL process are correct?()
    A

    An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.

    B

    An EIGRP route will go passive  if there are no successors in the EIGRP topology table.

    C

    DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.

    D

    A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.

    E

    The stuck in active state is caused when the wait for the query replies have timed out.

    F

    EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding EIGRP?()
    A

    Passive routes are in the process of being calculated by DUAL.

    B

    EIGRP supports VLSM, route summarization, and routing update authentication.

    C

    EIGRP exchanges full routing table information with neighboring routers with every update.

    D

    If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.

    E

    A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.


    正确答案: E,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)
    A

    In the DH key exchange process, the session key is never passed across the network.

    B

    In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C

    In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D

    In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    正确答案: A,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about the forwarding table?()
    A

    The forwarding table lists each source protocol and preference for each destination

    B

    The forwarding table constains only active routes

    C

    The forwarding table is used to process transit packets

    D

    The forwarding table is stored in compact flash


    正确答案: B,C
    解析: 暂无解析