单项选择题If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the  routes?()

A. 0
B. 1
C. 10
D. 20


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?()


 

A. Endpoint 1 is the only acceptable place to establish a trust boundary.
B. Endpoint 1 is the optimal place to establish a trust boundary. Endpoints 2 and 3 are acceptable places to establish a trust boundary.
C. Endpoint 2 is the only acceptable place to establish a trust boundary.
D. Endpoint 2 is the optimal place to establish a trust boundary. Endpoints 1 and 3 are acceptable places to establish a trust boundary.
E. Endpoints 1 and 2 are optimal places to establish a trust boundary. Endpoint 3 is an acceptable place to establish a trust boundary.
F. Endpoints 2 and 3 are optimal places to establish a trust boundary. Endpoint 1 is an acceptable place to  establish a trust boundary.

2.单项选择题What is the difference between the IPv6 addresses ::/0 and ::/128?()

A.::/0 is the unspecified address, and ::/128 is the multicast address
B.::/0 is the unicast address, and ::/128 is the anycast address
C.::/0 is the unicast address, and ::/128 is the multicast address
D.::/0 is the anycast address, and ::/128 is the multicast address
E.::/0 is the default route, and ::/128 is the unspecified address
F.::/0 is the anycast address, and ::/128 is the default address

3.多项选择题

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

A. A device is trusted if it correctly classifies packets.
B. A device is trusted if it correctly declassifies packets.
C. The outermost trusted devices represent the trust boundary.
D. Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.  
E. Network trust boundaries are automatically configured in IOS version 12.3 and later.
F. For scalability, classification should be done as close to the edge as possible.

4.单项选择题

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

A. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of  master virtual router.
B. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails,  Router B will become the master virtual router. When Router A recovers, it will regain the master virtual  router role.
C. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of  master virtual router.
D. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails,  Router A will become the master virtual router. When Router B recovers, it will regain the master virtual  router role.

5.多项选择题Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

A. access point certification and software control
B. compression and Layer 3 address mapping
C. Layer 3 addressing and distribution
D. packet encapsulation, fragmentation, and formatting
E. SNMP monitoring services

6.单项选择题

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

A.switchport priority extend trust
B.switchport priority extend cos 2
C.switchport priority extend cos 11
D.mls qos cos 2
E.mls qos cos 2 override

7.多项选择题

Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()

A.The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
B.The map prohibits the redistribution of all type 2 external OSPF routes
C.The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
D.The map prohibits the redistribution of all external OSPF routes with tag 6 set
E.All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
F.The map permits the redistribution of all type 1 external OSPF routes

8.单项选择题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()

A. LWAPP encrypts control traffic between the AP and the controller.
B. LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
C. LWAPP encrypts both control traffic and user data.
D. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

9.单项选择题

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

A.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual route
B.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router role
C.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role

10.单项选择题Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration

最新试题

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

题型:单项选择题

Which two Aironet enterprise solution statements are true?()

题型:多项选择题

What is the difference between the IPv6 addresses ::/0 and ::/128?()

题型:单项选择题

Which two statements are true about voice VLANs?()

题型:多项选择题

Which two statements are true about network voice traffic? (Choose two.)()

题型:多项选择题

Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?()

题型:单项选择题

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

题型:多项选择题

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

题型:单项选择题

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()

题型:单项选择题

Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()

题型:单项选择题