單項選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()

A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required

2.單項選擇題Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()

A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.

3.多項選擇題Which two of these are characteristics of MPLS VPNs? ()

A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

4.單項選擇題Which virtualization technology allows multiple physical devices to be combined into a singlelogical device?()

A. device visualization
B. device clustering
C. server visualization
D. network visualization

5.多項選擇題When designing the IP routing for the Enterprise Campus network, which of these following twoiBGB considerations should be taken into account?()

A. iBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetwork
B. iBGP requires a full mesh of eBGP peers
C. Routers will not advertise iBGP learned routers to other iBGP peers.
D. The use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGP
E. iGBP peers do not add any information to the AS path

7.多項選擇題Which two statements are correct regarding Flex Links? ()

A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second

8.多項選擇題OSPF stub areas are an important tool for the Network designer; which of the following two shouldbe considered when utilizing OSPF stub areas? ()

A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF totally stubby cannot distinguish among ABRs for the best route to destinationsoutsidethe areas
E. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPFdomain

9.多項選擇題As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()

A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information