Refer to the exhibit. Router E learned about the PIM RP (designated as 7.7.7.7) from four different sources. Routers A and D advertised the 7.0.0.0 network via EIGRP. Routers B and C advertised the 7.0.0.0 network via OSPF. Considering that all four Ethernet interfaces on router E could potentially lead back to the PIM-RP, when router E receives the first multicast packet down the shared tree, which incoming interface will be used to successfully pass the RPF check?()
A. E0
B. E1
C. E2
D. E3
E. None of these interfaces will be used to successfully pass the RPF check.
F. All of these interfaces would successfully pass the RPF check.
您可能感興趣的試卷
你可能感興趣的試題
A.512 bits
B.768 bits
C.1024 bits
D.2048 bits
Refer to the exhibit. How would you get the 1.1.1.1 network into the OSPF database? ()
A. Configure RTA as an ASBR
B. Redistribute connected routes on RTA into OSPF
C. Set up a virtual link between area 1 and area 0
D. Set up a virtual link between area 1 and area 2
E. Add a static route into RTB and enter it into OSPF
F. Place a network 1.1.1.0 0.0.0.0 command into RTB
G. Set up a unique router ID on RTA using an RFC 1918 address
H. Change area 0 on RTB to area 1
A.disable Zone-Based Firewall as the two features are not compatible
B.disable Cisco Express Forwarding as the two features are not compatible
C.generate a certificate and export on Cisco.com to receive a signature update
D.import the public RSA key from the Cisco IPS team that allows the router to verify that a signatureupdate (which was signed by this key) comes from Cisco
A. Add the command: router eigrp 1 traffic-share voice interface fast 0/0
B. Reconfigure EIGRP to recognize voice packets
C. Remove the variance from the configuration
D. Reconfigure the VoIP system to use RTP sequence number headers
E. Use an H '323 gatekeeper for your VoIP system to negotiate an H'245 uneven packet buffer
F. Reconfigure EIGRP to version 2
A.show ip pim rendez-vous
B.show ip rpf rp mapping
C.show ip pim rp mapping
D.show ip pim rp info
E.show ip pim
最新試題
Which three protocols or applications should be placed in a class that is configured with WRED?()
Which protocol and port have been assigned by IANA for RADIUS authentication?()
On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all links. If the link between PG-R1 and PG-R2 fails, what is the maximum number of queries PG-R3 will receive for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once (there are no dropped or retransmitted packets)?()
Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()
Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
Which of the following is true about the MPLS header and its EXP field size?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()