單項(xiàng)選擇題Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()

A.End system
B.Protocol
C.Application
D.Throughput


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Phase I and Phase II DMVPN differ in terms of which of these characteristics?()

A.Utilization of spoke-to-spoke dynamic tunnels
B.Utilization of multipoint GRE tunnels at the hub site
C.Utilization of hub-to-spoke dynamic tunnels
D.Support for multicast

2.單項(xiàng)選擇題Which one of the following potential issues is eliminated by using split horizon?()

A.Joined horizons
B.Packet forwarding loops
C.cisco Express Forwarding load-balancing inconsistency
D.Asymmetric routing throughout the network

4.單項(xiàng)選擇題f a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP advertisements?()

A.They are discarded
B.The contents are altered to reflect the switch’s own VTP database and then they are forward out  all trunking ports
C.The changes within the advertisements are made to the switch’s VTP database.
D.The contents are ignored and they are forwarded out all trunking ports.

5.單項(xiàng)選擇題Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()

A.IPsec site-to-site VPN
B.Cisco AutoSecure
C.Cisco IOS Firewall
D.IPS

最新試題

You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()

題型:?jiǎn)雾?xiàng)選擇題

Which IOS security feature is configured by the ip inspect inspection-name {in  out} command?()

題型:?jiǎn)雾?xiàng)選擇題

Phase I and Phase II DMVPN differ in terms of which of these characteristics?()

題型:?jiǎn)雾?xiàng)選擇題

For the following items,what is the mathematical relationship between the committed information  rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?()

題型:?jiǎn)雾?xiàng)選擇題

What are the "bound IP addresses" used for in LDP?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about an OSPF sham-link?()

題型:?jiǎn)雾?xiàng)選擇題

Which three are needed to run VRF lite for IPv6 on a router? ()

題型:多項(xiàng)選擇題

IEEE 802.1w is a Rapid Spanning Tree Protocol (RSTP) that can be seen as an evolution of the 802.1 standard. What are the port roles described by 802.1w?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement best describes OSPF external LSAs (type 5)?()

題型:?jiǎn)雾?xiàng)選擇題

For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()

題型:?jiǎn)雾?xiàng)選擇題