多項(xiàng)選擇題Company has a Catalyst 6500 and you need to configure redundancy between the supervisormodules. With route processor redundancy (RPR+), the redundant supervisor engine is fullyinitialized and configured, which shortens the switchover time if the active supervisor engine fails.Which three statements are true about the RPR + operations when the redundant supervisorengine switched over the failed primary supervisor engine?()

A.Static IP routes are maintained across a switchover because they are configured from entries inthe configuration file
B.Information about dynamic routing states, maintained on the active supervisor engine, issynchronized to the redundant supervisor engine and is transferred during the switchover
C.Information about dynamic routing states, maintained on the active supervisor engine, is notsynchronized to the redundant supervisor engine and is lost on switchover
D.The Forwarding Information Base (FIB) tables are cleared on a switchover. As a result, routedtraffic is interrupted until route tables reconverge
E.Static IP routes are cleared across a switchover and recreated from entries in the configurationfile on the redundant supervisor engine
F.The Forwarding Information Base (FIB) tables are maintained during the switchover. As aresult, routed traffic continues without any interruption when the failover occurs


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()

A.An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministration
B.Multiple SVIs can be associated with a VLAN
C.SVI is another name for a routed port
D.An SVI is created by entering the no switchport command in interface configuration mode
E.An SVI provides a default gateway for a VLAN

3.多項(xiàng)選擇題What is true about access control on bridged and routed VLAN traffic?()

A.Router ACLs can be applied to the input and output directions of a VLAN interface
B.Bridged ACLs can be applied to the input and output directions of a VLAN interface
C.Only router ACLs can be applied to a VLAN interface
D.VLAN maps and router ACLs can be used in combination
E.VLAN maps can be applied to a VLAN interfac

4.單項(xiàng)選擇題Switch SW1 has been configured with Private VLANs. With that type of PVLAN port should thedefault gateway be configured?()

A.Trunk
B.Isolated
C.Primary
D.Community
E.Promiscuous
F.None of the other alternatives apply

5.單項(xiàng)選擇題

Refer to the exhibit. The user who is connected to interface FastEthernet 0/1 is on VLAN 10 andcannot access network resources. On the basis of the information in the exhibit, which commandsequence would correct the problem?()

A.SW1(config)# interface fastethernet 0/1   SW1(config-if)# no shut
B.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access   SW1(config-if)# switchport access vlan 10
C.SW1(config)# vlan 10   SW1(config-vlan)# state active
D.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access
E.SW1(config)# vlan 10   SW1(config-vlan)# no shut

最新試題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:?jiǎn)柎痤}

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:?jiǎn)雾?xiàng)選擇題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項(xiàng)選擇題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:?jiǎn)柎痤}

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()

題型:多項(xiàng)選擇題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:?jiǎn)柎痤}