多項(xiàng)選擇題Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()

A.Configure OSPF between trigger router and black hole routes
B.Configure all edge routers with static (reserved) host route to Null0
C.Configure BGP beteen trigger and black hole routers
D.Configure on trigger router to advertise victim host route with commumity
E.Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge routers


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()

A.CoPP protects against IP spoofing;Racl protects against DoS attacks.
B.CoPP can not use named access lists;Racl can use named access lists
C.CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.
D.CoPP needs a AAA server,Racl does not need a AAA server
E.CoPP supports rate limits;Racl does not support rate limits

3.多項(xiàng)選擇題The Attribute field within the IS-IS LSP header contains which of the following flags? ()

A.IS-Type
B.Overload (LSPDBOL)
C.Pseudonode (PN)
D.Attached (ATT)
E.Fragment (Frag-Nr)
F.Partition (P)

5.多項(xiàng)選擇題Selective packet discard(SPD)operates in the following modes().

A.normal
B.select
C.random
D.discard
E.full

6.單項(xiàng)選擇題DSCP value "101110" looks like which IP Precedence value to non-DiffServ compliant devices?()

A.IP Precedence 2
B.IP Precedence 3
C.IP Precedence 4
D.IP Precedence 5
E.IP Precedence 6
F.IP Precedence 7

7.多項(xiàng)選擇題How do routers in an IS-IS Level-1 domain exit to reach other Level-1 (L1) domains?()

A.Level-1(L1) routers use default routes announced by Level-2(L2) routers in Level-1(L1) domain
B.Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcements from Level-1-2(L1/L2) router
C.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-1-2(L1/L2) by route-leaking feature of Cisco IOS
D.Level-1 routers use specific routes, for other Level-1 domain, announced by Level-2(L2) by route-leaking feature of Cisco IOS

8.多項(xiàng)選擇題Which descriptions of Netflow is correct?()

A.By default,Netflow records bidirectional IP traffic flow.
B.Netflow answers questions regarding IP traffic:who,what,where,when,and how
C.Netflow accounts for both transit traffic and traffic destined for the router.
D.Netflow returns the subinterface information in the flow records.

9.多項(xiàng)選擇題Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? ()

A.PW capabilities list
B.Message type
C.Assigned control connection ID
D.PW type
E.Remote session ID
F.Hostname

10.單項(xiàng)選擇題What best describes the usage of Route-Target rewrite?()

A.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C.Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D.None of the above.