單項(xiàng)選擇題Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall? ()

A. Attempt to TELNET from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If telnet works, BGP will work, since telnet and BGP both use TCP to transport data.
B. Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport packets.
C. There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work or not, other than trying to start the peering session.
D. There is no way to make BGP work across a firewall.


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題While deploying a new switch, you accidently connect ports 3/12 and 3/18 together, creating a loop. STP detected it and placed port 3/18 in blocking mode. Why did STP not place port 3/12 in blocking mode instead? ()

A. Port 3/12 was already up and forwarding before the loop was created.
B. Port priority is based on lowest priority and lowest port number.
C. You connected the wire on port 3/18 last.
D. None of the above, it is purely random.

3.單項(xiàng)選擇題After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()

A.Increase memory allocation for ACLs.
B.Remove all entries from the ACL and use a single permit ip any any statement.
C.Remove the log keyword from each ACL entry.
D.Reboot the device after the ACL has been applied.

5.單項(xiàng)選擇題Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()

A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs

最新試題

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

題型:?jiǎn)雾?xiàng)選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:?jiǎn)雾?xiàng)選擇題

An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()

題型:?jiǎn)雾?xiàng)選擇題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:?jiǎn)雾?xiàng)選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項(xiàng)選擇題

Based on the output provided in the exhibit, to which address or location will the router forward a packet sent to 192.168.32.1?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about SA caching are true?()

題型:多項(xiàng)選擇題

Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()

題型:?jiǎn)雾?xiàng)選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:?jiǎn)雾?xiàng)選擇題