niusouti.com

多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site id for each ce.BConfigure a VPN label for each VPN.CConfigure a MP-bgp session to each pe.DConfigure an Extended LDP Session to each pe.

题目
多选题
Which two steps are required for a Kompella Layer 2 VPN?()
A

Configure a site id for each ce.

B

Configure a VPN label for each VPN.

C

Configure a MP-bgp session to each pe.

D

Configure an Extended LDP Session to each pe.


相似考题
参考答案和解析
正确答案: C,D
解析: 暂无解析
更多“多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a siteid for each ce.BConfigure a VPN label for each VPN.CConfigure a MP-bgp session to each pe.DConfigure an Extended LDP Session to each pe.”相关问题
  • 第1题:

    Which option describes the incorrect usage of the Label Distribution method?()

    • A、LDP is primarily used in internal networks of MPLS-VPN providers.
    • B、MP-BGP is used for label distribution for VPN customer routes.
    • C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.
    • D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

    正确答案:D

  • 第2题:

    Company.com wants to put two Micro-Partitions on a p5-570 and attach to a SAN. What is the best LPAR configuration to maximize SAN availability using four Host Bus Adapters (HBAs)?()

    • A、Two HBAs assigned to each redundant VIOS which provides VSCSI access to LUNs
    • B、Two HBAs assigned to each LPAR with each LPAR owning HBAs on the same PCI busses
    • C、Two HBAs assigned to each LPAR with each LPAR owning HBAs on separate PCI busses
    • D、One HBA assigned to each LPAR and two HBAs assigned to a VIOS providing VSCSI access to LUNs

    正确答案:A

  • 第3题:

    Which two steps are required for a Kompella Layer 2 VPN?()

    • A、Configure a site id for each ce.
    • B、Configure a VPN label for each VPN.
    • C、Configure a MP-bgp session to each pe.
    • D、Configure an Extended LDP Session to each pe.

    正确答案:A,C

  • 第4题:

    Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()

    • A、Port mirroring
    • B、VPN
    • C、Trunking
    • D、Port authentication

    正确答案:C

  • 第5题:

    Which two steps are required for a Kompella Layer 2 VPN?()

    • A、Configure a site ID for each CE
    • B、Configure a VPN label for each VPN
    • C、Configure a MP-BGP session to each PE
    • D、Configure an Extended LDP Session to each PE

    正确答案:A,C

  • 第6题:

    You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()

    • A、Select L2TP/IPSec on each Windows Mobilebased device.
    • B、Obtain and install a certificate on each Windows Mobilebased device.
    • C、Configure the appropriate pre-shared key on each Windows Mobilebased device.
    • D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

    正确答案:A,B

  • 第7题:

    单选题
    You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do?()
    A

    Configure a VPN server in Sydney.

    B

    Configure a VPN server in each branch office.

    C

    Configure a dial-up server in Sydney.

    D

    Configure a dial-up server in each branch office.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements accurately describe an IBGP peering session?() (Choose two.)
    A

    Peers are statically defined.

    B

    Peers exist within the same AS.

    C

    Peers must be directly connected to each other.

    D

    Peers advertise routes learned from other IBGP neighbors.


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    Refer to the exhibit. Which three statements correctly describe Network Device A?()
    A

    With a network wide mask of 255.255.255.128, each interface does not require an IP address.

    B

    With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.

    C

    With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.

    D

    With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.

    E

    With a network wide mask of 255.255.254.0, each interface does not require an IP address.


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    单选题
    Records of garbage disposal are required to be maintained ().
    A

    until each quadrennial PSC inspection

    B

    until the end of each voyage

    C

    for a minimum of one year

    D

    for a minimum of two years


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()
    A

    Select L2TP/IPSec on each Windows Mobilebased device.

    B

    Obtain and install a certificate on each Windows Mobilebased device.

    C

    Configure the appropriate pre-shared key on each Windows Mobilebased device.

    D

    Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
    A

    Configure each server running Routing and Remote Access as a RADIUS Client.  

    B

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  

    C

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  

    D

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.  


    正确答案: A
    解析: 暂无解析

  • 第13题:

    What are the "bound IP addresses" used for in LDP?()

    • A、For each such address and mask /32, one label binding is created.
    • B、As the TCP endpoint, IP addresses are used by the LDP session.
    • C、These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.
    • D、These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 

    正确答案:C

  • 第14题:

    PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()

    • A、an LSP for each local CE device
    • B、an LSP for each remote PE device
    • C、an LSP for each remote CE device
    • D、an LSP for each CE facing interface

    正确答案:B

  • 第15题:

    Which two statements accurately describe an IBGP peering session?() (Choose two.)

    • A、Peers are statically defined.
    • B、Peers exist within the same AS.
    • C、Peers must be directly connected to each other.
    • D、Peers advertise routes learned from other IBGP neighbors.

    正确答案:A,B

  • 第16题:

    In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()

    • A、IP address and IP label of each service and boot interface in the cluster
    • B、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the node
    • C、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gateway
    • D、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

    正确答案:B

  • 第17题:

    Your company has 10 offices.  The offices connect to the Internet by using a WAN link.  The offices connect to each other by using a VPN connection.  An Active Directory site exists for each office. You plan to deploy Exchange Server 2010. Each site will contain two Exchange Server 2010 servers.  You need to recommend the placement of domain controllers and global catalog servers to meet thefollowing requirements: .Minimize the number of domain controllers .Must be able to deliver e-mail messages between users of the same office, if a domain controller and aWAN link fail simultaneously What should you recommend?()

    • A、In each site, install two global catalog servers.
    • B、In each site, install two domain controllers. Enable Universal Group Membership caching for each site.
    • C、In each site, install two domain controllers. Create a publishing point for an offline address list on one Exchange server in each site.
    • D、In each site, install one domain controller that is configured as a global catalog server.Enable Universal Group Membership caching for each site.

    正确答案:A

  • 第18题:

    You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()

    • A、 A single forest with one tree, and one domain
    • B、 A single forest with one tree two domain
    • C、 A single forest with two trees, each with a single domain
    • D、 Two forests, each with a single tree and a single domain
    • E、 Two forests, each with two trees, with a single domain in each tree.

    正确答案:A

  • 第19题:

    单选题
    You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()
    A

    Configure a demand-dial router.

    B

    Create multiple Active Directory site links.

    C

    Configure a VPN connection between each branch office.

    D

    Install an Internet Authentication Service (IAS) server in each branch office.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()
    A

     A single forest with one tree, and one domain

    B

     A single forest with one tree two domain

    C

     A single forest with two trees, each with a single domain

    D

     Two forests, each with a single tree and a single domain

    E

     Two forests, each with two trees, with a single domain in each tree.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()
    A

    MPLS LSP

    B

    ATM tunnel

    C

    GRE tunnel

    D

    IPSEC tunnel

    E

    L2TPv3 session


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    单选题
    What are the "bound IP addresses" used for in LDP?()
    A

    For each such address and mask /32, one label binding is created.

    B

    As the TCP endpoint, IP addresses are used by the LDP session.

    C

    These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.

    D

    These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two steps are required for a Kompella Layer 2 VPN?()
    A

    Configure a site id for each ce.

    B

    Configure a VPN label for each VPN.

    C

    Configure a MP-bgp session to each pe.

    D

    Configure an Extended LDP Session to each pe.


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two steps are required for a Kompella Layer 2 VPN?()
    A

    Configure a site ID for each CE

    B

    Configure a VPN label for each VPN

    C

    Configure a MP-BGP session to each PE

    D

    Configure an Extended LDP Session to each PE


    正确答案: D,C
    解析: 暂无解析