單項(xiàng)選擇題If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the  routes?()

A. 0
B. 1
C. 10
D. 20


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.
B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.
C. No. Traffic will loop back and forth between switch S5 and S2.
D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.
E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.

2.單項(xiàng)選擇題Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

A. The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.
B. LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.
C. LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.
D. LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

4.多項(xiàng)選擇題Which two statements are true about network voice traffic? (Choose two.)()

A. Voice traffic is affected more by link speed than FTP traffic is.
B. Voice traffic is affected more by packet delays than FTP traffic is.
C. Voice streams involve larger packet sizes than most TCP network traffic involves.
D. Voice traffic is more sensitive to packet loss than TCP network traffic is.
E. Voice traffic requires QOS mechanisms only in heavily loaded network segments.

5.單項(xiàng)選擇題

Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()

A.R4(config)# ip default-network 10.0.0.0
B.R4(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
C.R4(config)# ip route 10.0.0.0 255.0.0.0 10.1.1.1
D.R4(config-router)# default-information originate

6.多項(xiàng)選擇題What are two rules for compacting IPv6 addresses?()

A.The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two
B.The leading zeroes in any 16-bit segment do not have to be written.
C.Every 16-bit segment that consists of all zeroes can be represented with a single colon
D.The trailing zeroes in any 16-bit segment do not have to be written.
E.Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon
F.Two zeroes in the middle of any 16-bit segment do not have to be written

7.單項(xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

A.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual route
B.Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router role
C.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D.Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role

8.多項(xiàng)選擇題What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

A.The network was originated via redistribution of an interior gateway protocol into BGP
B.The network was defined by a static route
C.The network was originated via a network or aggregate command
D.The network was learned via EBGP
E.The network was learned via IBGP

9.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A.Physically the voice network and the data network are separate
B.The voice traffic will normally be on a different IP subnet than will the data traffic
C.End user intervention is necessary to place the phone into the proper VLAN
D.The same security policy should be implemented for both voice and data traffic
E.The data VLAN must be configured as the native VLAN

10.單項(xiàng)選擇題Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration

最新試題

A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about where trust boundaries should be established in a  network?() 

題型:單項(xiàng)選擇題

Which two statements are true about voice packets in a LAN? (Choose two.)  ()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

題型:單項(xiàng)選擇題

Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

題型:多項(xiàng)選擇題

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()

題型:單項(xiàng)選擇題

Refer to the exhibit. EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default route to its neighbors?()

題型:單項(xiàng)選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

題型:單項(xiàng)選擇題

Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  

題型:多項(xiàng)選擇題