多項選擇題Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router?()

A.SMTP
B.ICMP
C.BGP
D.SSH
E.RTP
F.BitTorrent
G.VTP


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth, a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()

A. Pay special attention to the VTP revision number, because the higher value takes the priority.
B. Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C. A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D. Set at least the VTP domain name and password to get the new switch synchronized.
E. An ISL trunk should be established between the new switch and switches 1 and 3, because VTP only runs over ISL.
F. Pay special attention to the VTP revision number, because the lower value takes the priority.

2.多項選擇題Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()

A.It is used in multihome network scenarios.
B.It can be used with BGP to mitigate DoS and DDoS.
C.It does not need to have CEF enabled.
D.It is enabled via the interface level command ip verify unicast reverse-path.
E.It cannot be used with "classification" access lists.

3.單項選擇題What does Cisco recommend when you are enabling Cisco IOS IPS?()

A.Do not enable all the signatures at the same time.
B.Do not enable the ICMP signature.
C.Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D.Disable CEF because it is not compatible with Cisco IOS IPS. .

4.多項選擇題Which three statements are true about TACACS+?()

A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.

5.單項選擇題What is Phantom RP used for?()

A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM

最新試題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:單項選擇題

Which multicast address is reserved for cisco-rp-discovery?()

題型:單項選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項選擇題

Which two statements about SA caching are true?()

題型:多項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題

On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()

題型:單項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項選擇題