多項(xiàng)選擇題Which of the following are not true OSPF LSA rules?()

A.OSPF LSA type 5 triggers an LSA type 7 at an ABR between an NSSA and the backbone area
B.OSPF LSA type 1 triggers an LSA type 3 at an ABR.
C.OSPF LSA type 7 triggers an LSA type 5 at an ABR between an NSSA and the backbone area
D.OSPF LSA type 3 triggers an LSA type 4 at an ABR.
E.OSPF LSA type 5 triggers an LSA type 7 at an A5BR but only in N5SAs
F.OSFP LSA type 2 triggers an LSA type 3 at an ABR


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following is not a valid reason for a packet to be punted?()

A.The TCAM has reached capacity
B.An unknown destination MAC address
C.A packet being discarded due to a security violation
D.A Telnet packet from a session being initiated with the switch
E.Routing protocols sending broadcast traffic
F.A packet belonging to a GRE tunnel

2.單項(xiàng)選擇題A new router is added to an existing HSRP standby group. One of the existing routers is in anactive state, the other is in a standby state. Under what circumstance will the new router becomethe active router?()

A.The new router will become active immediately because it’s the newest router introduced intothe group
B.The new router can become active only when the existing active router and the existing standbyrouter become unavailable
C.The new router has a lower priority value
D.The new router will never become active unless the existing active router becomes unavailable
E.The new router has preempt configured and a higher priority
F.The new router has a higher priority value

3.單項(xiàng)選擇題How long will a port remain in the listening state by default?()

A.Depends on the number of switches in the spanning tree domain
B.50 seconds
C.15 seconds
D.Until the root directs it to start forwarding
E.20 seconds
F.Depends on the pott speed

4.多項(xiàng)選擇題Which of the following commands can be used to gather information about the AS-PATH of a BGProute? (Choose all that apply.)()

A.show ip bgp neighbors
B.debug ip bgp updates
C.show ip route bgp
D.show ip bgp
E.show ip bgp summary
F.sh ip bgp database

5.單項(xiàng)選擇題Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()

A.The configuration on the FTP server is copied to RAM
B.The command is not valid on a Cisco router
C.The configuration file in RAM is copied to an FTP server
D.The configuration file in NVRAM is copied to an FTP server
E.The configuration on the FTP server is copied to NVRAM
F.The configuration will be copied from NVRAM to an FTP server with a filename of Kevin

最新試題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:?jiǎn)柎痤}

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項(xiàng)選擇題

cisco ios command to interface dialer 0

題型:?jiǎn)柎痤}

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:?jiǎn)柎痤}

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below

題型:?jiǎn)柎痤}

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項(xiàng)選擇題