A.It is used in multihome network scenarios.
B.It can be used with BGP to mitigate DoS and DDoS.
C.It does not need to have CEF enabled.
D.It is enabled via the interface level command ip verify unicast reverse-path.
E.It cannot be used with "classification" access lists.
您可能感興趣的試卷
你可能感興趣的試題
A.Do not enable all the signatures at the same time.
B.Do not enable the ICMP signature.
C.Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D.Disable CEF because it is not compatible with Cisco IOS IPS. .
A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM
Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()
A. UDLD (UniDirectional Link Detection)
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable
A.Membership Query
B.Membership Report
C.Membership Delay
D.Backward Compatible IGMPv1 Report Message
最新試題
Which three message types are valid PIMv2 message types?()
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()
Which multicast address is reserved for cisco-rp-discovery?()
In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
What is true about Unicast RPF in strict mode?()
Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()