單項選擇題Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall? ()

A. Attempt to TELNET from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If telnet works, BGP will work, since telnet and BGP both use TCP to transport data.
B. Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport packets.
C. There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work or not, other than trying to start the peering session.
D. There is no way to make BGP work across a firewall.


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題While deploying a new switch, you accidently connect ports 3/12 and 3/18 together, creating a loop. STP detected it and placed port 3/18 in blocking mode. Why did STP not place port 3/12 in blocking mode instead? ()

A. Port 3/12 was already up and forwarding before the loop was created.
B. Port priority is based on lowest priority and lowest port number.
C. You connected the wire on port 3/18 last.
D. None of the above, it is purely random.

3.單項選擇題After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()

A.Increase memory allocation for ACLs.
B.Remove all entries from the ACL and use a single permit ip any any statement.
C.Remove the log keyword from each ACL entry.
D.Reboot the device after the ACL has been applied.

5.單項選擇題Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()

A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs

6.多項選擇題Refer to the exhibit. There are two sites connected across WAN links. All intersite and intrasite links always have the same routing metric. The network administrator sees only the top routers and links being used by hosts at both LAN A and LAN B. What would be two suggestions to load-balance the traffic across both WAN links?()

A. Make HSRP track interfaces between the edge and core routers.
B. Replace HSRP with GLBP.  用GLBP替換HSRP
C. Add crossed intrasite links: R1-R4, R2-R3, R5-R8, and R6-R7.
D. Make R3 and R8 have lower HSRP priority than R1 and R7.
E. Replace HSRP with VRRP

8.單項選擇題Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no connectivity between RemoteB and the central office. What is a possible solution to this issue? ()

A. Because Frame Relay IETF encapsulation is only configurable at interface level, you must use IETF encapsulation on all routers.
B. This is not a possible scenario. A dedicated Frame Relay link to RemoteB is mandatory at the central office.
C. The router at RemoteB must be replaced by a Cisco router.
D. Use Frame Relay IETF encapsulation on a per-VC basis on the central office router.
E. There is a problem in the Frame Relay cloud, because Cisco routers are compatible with IETF Frame Relay.

9.單項選擇題For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()

A.ip verify unicast source reachable-via any
B.ip verify unicast reverse-path
C.ip verify unicast reverse-path loose
D.ip verify unicast reverse-path strict

10.單項選擇題Before inserting a new switch in the network, the network administrator checks that the VTP domain name is correct, the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks, erases existing VLANs, and connects the switch to the network. Following that procedure, there is no connectivity in the network. What is a possible cause of this problem? ()

A. Because the configuration revision of the new switches is lower than the rest of the network,it can change the VLAN database of the other switches.
B. As a VTP server, the new switch deleted all VLANs of the network.
C. Erasing VLANs increases the VTP configuration revision.
D. Since the configuration revision of the network is higher than the new switch,the VLAN database was automatically synchronized.

最新試題

Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()

題型:單項選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:單項選擇題

Which three protocols or applications should be placed in a class that is configured with WRED?()

題型:多項選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項選擇題

Which of the following is true about the MPLS header and its EXP field size?()

題型:單項選擇題

In GLBP,which router will answer on client ARP requests?()

題型:單項選擇題

When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()

題型:單項選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題

Which protocol and port have been assigned by IANA for RADIUS authentication?()

題型:單項選擇題