單項(xiàng)選擇題

RIP and OSPF are configured on the routers as shown in the exhibit. R2 is configured with a two-way redistribution between RIP and OSPF domains. All routers can ping each other, but R1cannot see any of the OSPF routes in its routing table. What could the problem be?()

A.OSPF and RIP use the same major network 172.16.0.0. Therefore, the keywordsubnets is notrequired to redistribute protocols into OSPF
B.Because OSPF has a longer mask for the same major network than RIP and because RIPversion 1 is being used, none of the routes learned from OSPF will be advertised into RIP
C.The metric for the OSPF routes that are redistributed into RIP is too low, a fact that preventsOSPF routes from being advertised into RIP
D.The process of redistribution of RIP into OSPF does not require any metric conversion, so thereis no need to define the metric using the default-metric command during the redistribution


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the network shown below:

R1 and R2 belong to the RIP routing domain that includes the networks 10.20.0.0/16 and
10.21.0.0/16. R3 and R4 are performing two-way route redistribution between OSPF and RIP. Anetwork administrator has discovered that R2 is receiving OSPF routes for the networks
10.20.0.0/16 and 10.21.0.0/16 and a routing loop has occurred. Which action will correct thisproblem?()

A.Set the OSPF default metric to 20
B.Apply an inbound ACL to the R2 serial interface
C.Configure distribute-lists on R3 and R4
D.Change the RIP administrative distance on R3 to 110
E.Change the OSPF administrative distance on R3 to 110
F.None of the other alternatives apply

3.單項(xiàng)選擇題

Refer to the exhibit and the partial configuration on router R2. On router R4 all RIP routes areredistributed into the OSPF domain. A second redistribution is configured on router R2 using aroute map. Based on the configuration on router R2, which EIGRP external routes will be presentin the routing table of R1?()

A.There will be no EIGRP external routes in the routing table of R1
B.The routes originating from the RIP routing domain
C.Only routes originating in the OSPF routing domain
D.All routes originating from RIP and OSPF routing domains
E.None of the other alternatives apply

4.單項(xiàng)選擇題Given the multicast IP address of 224.193.5.10,what would the corresponding multicast MAC address be()

A.00-00-0c-c0-05-0a
B.00-00-0c-cl-05-0a
C.01-00-5e-00-00-0c
D.01-00-5e-41-05-0a
E.00-00-0c-01-00-5e
F.01-00-5e-cl-05-0a

5.多項(xiàng)選擇題During a redistribution of routes from OSPF into EIGRP, the administrator notices that none of theOSPF routes are showing up in EIGRP. What are two possible causes?()

A.Incorrect distribute lists have been configured
B.Missing ip classless command
C.CEF not enabled
D.No default metric configured for EIGRP

最新試題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項(xiàng)選擇題

Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()

題型:多項(xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:問答題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:單項(xiàng)選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項(xiàng)選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題