Refer to the exhibit. Router RT3 discovers network 202.176.56.0 via BGP. Which one of thesestatements is true?()
A.RT1 advertised network 202.176.50.0/24 with a metric of 782
B.RT3 is directly connected to RT1 using subnet 192.168.1.0
C.RT3 has an IGP metric of 782 to reach 192.168.1.1
D.RT3 has a BGP metric of 782 to reach 192.168.1.1
E.RT1 advertised network 202.176.50.0/24 with a metric of 1000
F.RT3 has an IGP metric of 1782 to reach 202.176.56.0/24
您可能感興趣的試卷
你可能感興趣的試題
A.Memory requirements are higher for shared distribution tree than for source distributiontree.
B.Creates a tree from a central RP to all last-hoprouters.
C.Uses a rendezvous point.
D.An optimal path is created between each source router and each last-hoprouter.
E.Place(S,G)entry in each router’smulticast routing table.
F.Place(*,G)entry in a router’smulticast routing to table.
Refer to the exhibit. Routers RTA and RTB are running BGP but the session is active. Whatcommand needs to be added to establish the BGP session?()
A.ip route 10.10.10.1 255.255.255.255 s0/0 ip route 10.10.10.1 255.255.255.255 s0/1
B.network 10.10.10.0
C.no synchronization
D.neighbor 10.10.10.1 next-hop-self
A.Statically defined RP
B.Bootstrap Router
C.Auto-RP
D.RP Discovery Protocol(RDP)
E.RP Helios
F.RPARP(RARP)
A.Clear the BGP session
B.Change both the inbound and outbound policy related to this route
C.Use the service-policy command to adjust the QOS policy to allow the route to propagate
D.Use the release BGP routing command
Refer to the exhibit. Router RTR is attempting to establish BGP neighbor relationships with routersRT1 and RT3. On the basis of the information that is presented in the exhibit, which twostatements are true?()
A.RTR has a BGP password set but neighbor 10.0.0.1 does not
B.Neighbor 10.0.0.5 has a BGP password set but RTR does not
C.RTR has a BGP password set but neighbor 10.0.0.5 does not
D.RTR has a BGP password set but neighbor 10.0.0.1 has an incorrect password set
E.Neighbor 10.0.0.1 has a BGP password set but RTR does not.
F.RTR has a BGP password set but neighbor 10.0.0.5 has an incorrect password set
最新試題
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
Match the xDSL type on the above to the most appropriate implementation on the below.
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()