單項選擇題A request arrived on your MPLS-vpn-bgp group. Due to a security breach,your customer is experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four subnets listed:200.0.10.0/24,200.0.11.0/24,200.0.12.0/24,200.0.13.0/24. You immediately apply an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 0.0.0.0 255.255.254.255 access-list 1 permit any What happens when you apply this ACL on the MPLS-EBGP connection to BHK?()

A.It blocks all routes.
B.It blocks the routes 200.0.12.0/24,200.0.10.0/24 only.
C.It blocks the routes 200.0.12.0/24,200.0.13.0/24 only.
D.It blocks the routes 200.0.10.0/24,200.0.13.0/24 only.
E.Nothing happens,no routes are blocked.


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth,a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()

A.Pay special attention to the VTP revision number, because the higher value takes the priority.
B.Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C.A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D.Set at least the VTP domain name and password to get the new switch synchronized.
E.An ISL trunk should be established between the new switch and switches 1 and 3,because VTP only runs over ISL.
F.Pay special attention to the VTP revision number, because the lower value takes the priority.

3.多項選擇題Which two of these elements need to be configured prior to enabling SSH?()

A.hostname
B.loopback address
C.default gateway
D.domain name
E.SSH peer address

4.單項選擇題When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()

A.the number of packets that are discarded because they exceed the maximum packet size of the medium
B.errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
C.the number of packets that are discarded because they are smaller than the minimum packet size of the medium
D.the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
E.the number of times that the interface requested another interface within the router to slow down

5.單項選擇題If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name

6.單項選擇題If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication,connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name

7.多項選擇題When using IP SLA FTP operation,which two FTP modes are supported?()

A.Only the FTP PUT operation type is supported.
B.Active mode is supported.
C.Passive FTP transfer modes are supported.
D.FTP URL specified for the FTP GET operation is not supported.

9.單項選擇題

Refer to the exhibit. Look at the command output. What can you use to prevent this behavior?()

A.UDLD
B.spanning-tree loopguard
C.VTP mode transparent
D.switchport mode desirable

最新試題

Refer to the exhibit.The network administrator is in acampus building distant from Building B.WANRouter is hosting a newly installed WAN link on interface S0/0.The new link is not functioning and the administrator needs to determine if the correct cable has been attached to the S0/0 interface.How can the administrator accurately verify the correct cable type on S0/0 in the most efficient manner?()

題型:單項選擇題

Refer to the exhibit.Which statement describes DLCI 17?()

題型:單項選擇題

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2.The routers cannot establish an adjacency relationship on their common Ethernet link.The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2.Based on the information in the graphic,what is the cause of this problem?()

題型:單項選擇題

R1 will choose which path to reach 10.1.0.0?

題型:問答題

How should arouter that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()

題型:單項選擇題

當(dāng)將多個交換機加入到MST region當(dāng)中會發(fā)生什么(what happen)?

題型:問答題

what is four ospf area type?

題型:問答題

兩ebgp鄰居發(fā)路由過來 ,哪些屬性重置?

題型:問答題

什么問題導(dǎo)致SERVER VTP密碼跟替他交換機VTP密碼不匹配?

題型:問答題

什么是NAT?

題型:問答題