niusouti.com

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward

题目
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

A. all interfaces in the path toward the destination

B. all networks in the path toward the destination

C. adjacent next hop router in the path toward the destination

D. all routers in the path toward the destination

E. all interfaces through which the packets can be routed

F. type of service and precedence in the IP packets


相似考题
参考答案和解析
参考答案:C, E, F
更多“When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() ”相关问题
  • 第1题:

    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()

    A.Bus

    B.Mesh

    C.Multipath

    D.Ring


    参考答案:B

  • 第2题:

    Which of the following is the most effective technique to prevent source IPAddress spoofing?()

    • A、 policy based routing (PBR)
    • B、 unicast reverse path forwarding (uRPF)
    • C、 lock and keyACL
    • D、 RFC 1918filtering
    • E、 IP source routing

    正确答案:B

  • 第3题:

    Which agent will be selected when the Resource Selection Criteria is set to circular routing?()

    • A、the agent who has been in the Available state for the longest amount of time  
    • B、the next available agent with the highest priority, as determined by the agent order in the Resources list
    • C、the next available agent, based on the last agent selected and the agent order in the Resources list  
    • D、the agent assigned to the selected Resource Group and is thus qualified to be selected

    正确答案:C

  • 第4题:

    A policy-based IPsec VPN is ideal for which scenario?()

    • A、when you want to conserve tunnel resources
    • B、when the remote peer is a dialup or remote access client
    • C、when you want to configure a tunnel policy with an action of deny
    • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

    正确答案:B

  • 第5题:

    Which statement about the ip classless router command is true?()

    • A、The ip classless command is enabled by default in recent versions of IOS.
    • B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.
    • C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.
    • D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

    正确答案:A

  • 第6题:

    Which three statements are true about Cisco IOS Firewall?()

    • A、It can be configured to block Java traffic.
    • B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
    • C、It can only examine network layer and transport layer information.
    • D、It can only examine transport layer and application layer information.
    • E、The inspection rules can be used to set timeout values for specified protocols.
    • F、The ip inspect cbac-name command must be configured in global configuration mode.

    正确答案:A,B,E

  • 第7题:

    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

    • A、routing-instance
    • B、zone
    • C、interface
    • D、policy
    • E、rule-set

    正确答案:A,B,C

  • 第8题:

    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?() 

    • A、 whether the password is set in the listener or a file or not
    • B、 the number of client connections the service handler has refused
    • C、 the information will be displayed whether the instance can accept connections or not
    • D、 the protocol addresses on which the listener is configured to listen

    正确答案:B

  • 第9题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()
    A

    The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabled

    B

    Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

    Backup optimization is permanently disabled

    D

    Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()
    A

    The tunnel that is not configured with the policy-class command acts as the default

    B

    EXP selection is between multiple tunnels to the same destination

    C

    There is no requirement for IGP extensions

    D

    Tunnels are configured using the policy-class command and carry multiple EXP values

    E

    It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
    A

    all interfaces in the path toward the destination

    B

    all networks in the path toward the destination

    C

    adjacent next hop router in the path toward the destination

    D

    all routers in the path toward the destination

    E

    all interfaces through which the packets can be routed

    F

    type of service and precedence in the IP packets


    正确答案: F,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding routing policy processing?()
    A

    The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.

    B

    Policies are evaluated from right to left as displayed in the Junos OS configuration file.

    C

    Polices are evaluated based on the order in which they are applied to a routing protocol.

    D

    Policy processing stops once the last statement in the policy is evaluated.


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. Based upon the configuration, you need to understand why the policy routi match counts are not increasing. Which would be the first logical step to take?()

    A. Confirm if there are other problematic route - map statements that precede divert.

    B. Check the access list for log hits.

    C. Check the routing table for 212.50.185.126.

    D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)


    参考答案:B

  • 第14题:

    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

    • A、all interfaces in the path toward the destination
    • B、all networks in the path toward the destination
    • C、adjacent next hop router in the path toward the destination
    • D、all routers in the path toward the destination
    • E、all interfaces through which the packets can be routed
    • F、type of service and precedence in the IP packets

    正确答案:C,E,F

  • 第15题:

    Which command will apply a policy to redistribute static routes into OSPF?()

    • A、set protocols ospf import static-routes
    • B、set protocols ospf export static-routes
    • C、set routing-options static defaults readvertise
    • D、set routing-options static route 0.0.0.0/0 readvertise

    正确答案:B

  • 第16题:

    Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()

    • A、Pass
    • B、Flow
    • C、Allow
    • D、Inspect

    正确答案:A,D

  • 第17题:

    Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()

    • A、The tunnel that is not configured with the policy-class command acts as the default
    • B、EXP selection is between multiple tunnels to the same destination
    • C、There is no requirement for IGP extensions
    • D、Tunnels are configured using the policy-class command and carry multiple EXP values
    • E、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching

    正确答案:D

  • 第18题:

    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()

    • A、Bus
    • B、Mesh
    • C、Multipath
    • D、Ring

    正确答案:B

  • 第19题:

    Which two statements are true regarding routing policy processing?()

    • A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
    • B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.
    • C、Polices are evaluated based on the order in which they are applied to a routing protocol.
    • D、Policy processing stops once the last statement in the policy is evaluated.

    正确答案:A,C

  • 第20题:

    单选题
    Which of the following is the most effective technique to prevent source IPAddress spoofing?()
    A

     policy based routing (PBR)

    B

     unicast reverse path forwarding (uRPF)

    C

     lock and keyACL

    D

     RFC 1918filtering

    E

     IP source routing


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()
    A

     The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabled

    B

     Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

     Backup optimization is permanently disabled

    D

     Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?()
    A

     whether the password is set in the listener or a file or not

    B

     the number of client connections the service handler has refused

    C

     the information will be displayed whether the instance can accept connections or not

    D

     the protocol addresses on which the listener is configured to listen


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Policy -Based Routing (PBR) has been enabled on Router R1's interfa ce F0/0. Which of the following is true regarding how PBR works?()
    A

    Packets entering F0/0 will be compared based on the PBR route map.

    B

    Packets exiting F0/0 will be compared based on the PBR route map.

    C

    IOS ignores the PBR forwarding directions wh en the packet matches a route map deny clause.

    D

    IOS ignores the PBR forwarding directions when the packet matches a route map permit clause.


    正确答案: D,B
    解析: 暂无解析