CMS专题

多选题Which three options are valid ways to filter routes from a BGP peer?()Afilter-listBinbound ACLCroute-mapDoutbound ACLEprefix-listFneighbor 10.0.0.1 deny-map my-map command

题目
多选题
Which three options are valid ways to filter routes from a BGP peer?()
A

filter-list

B

inbound ACL

C

route-map

D

outbound ACL

E

prefix-list

F

neighbor 10.0.0.1 deny-map my-map command

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three methods can you use for route discovery on a WX platform? ()(Choose three.)

A. Enable RIP

B. Enable OSPF

C. Periodically poll any router

D. Import routes from a TFTP server


参考答案:A, B, D

第2题:

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?()

A. the OSPF route

B. the EIGRP route

C. the RIPv2 route

D. all three routes

E. the OSPF and RIPv2 routes


参考答案:B

第3题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第4题:

Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)

  • A、The WAN link is down.
  • B、IPSec is enabled on the WX.
  • C、Traceroute is enabled for compression.
  • D、The network is configured using static routes.
  • E、The local and remote cables are accidentally swapped.

正确答案:A,C,E

第5题:

Cisco collaboration applications and services can be hosted in A number of ways, which three are valid hosting models?()

  • A、device-specific
  • B、on-premises
  • C、integrated
  • D、hybrid
  • E、virtual
  • F、SaaS

正确答案:B,D,F

第6题:

You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()

A. Are the ASBRs trying to redistribute the external routes into a totally stubby area?

B. Are the ABRs configured with stubby areas?

C. Is the subnets keyword being used with the redistribution command?

D. Is backbone area (area 0) contiguous?

E. Is the CPU utilization of the routers high?


参考答案:A, C

第7题:

You are troubleshooting an OSPF problem where external routes are not showing up in the OSPF database. Which two options a re valid checks that should be performed first to verify proper OSPF operation?()

  • A、Are the ASBRs trying to redistribute the external routes into a totally stubby area?
  • B、Are the ABRs configured with stubby areas?
  • C、Is the subnets keyword being used with the redistribution command?
  • D、Is backbone area (area 0) contiguous?
  • E、Is the CPU utilization of the routers high?

正确答案:A,C

第8题:

Whichactionoccurswhenthepolicymain-policyevaluatestheBGProute10.0.55.2/32?()

[editpolicy-options]

policy-statementtest{

from{

route-filter10.0.0.016/orlongeraccept;

route-filter10.0.67.0/24orlangerreject;

route-filter10.0.0.0/8orlanger;

}

then{

metric10;

communityaddno-advertise;

accept;

}

}

policy-statementmain-policy{

termonly-want-certain-routes{

from{

policytest;

}

then{

communityaddharry-402;

accept;

}

}

}

communitynoadvertisemembersno-advertise;

communityharry-402members666:402;

[editprotocols]

bgp{

exportmain-policy;}


参考答案:B

第9题:

What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()

  • A、IP address
  • B、MAC address
  • C、protocol
  • D、port
  • E、session ID

正确答案:A,C,D

第10题:

Which statement is correct about policies in the Junos OS?()

  • A、Import policies are used to filter routes from the routing table to the forwarding table.
  • B、Import policies are used to filter routes destined for the routing table.
  • C、Import policies are used to filter routes being sent to neighboring devices.
  • D、Import policies are used to filter traffic entering the device.

正确答案:B

更多相关问题