Passive routes are in the process of being calculated by DUAL.
EIGRP supports VLSM, route summarization, and routing update authentication.
EIGRP exchanges full routing table information with neighboring routers with every update.
If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
第1题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第2题:
Which two statements are true regarding the role of the Routing Engine (RE)?()
第3题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第4题:
Which two statements are true regarding L2TP? ()(Choose two.)
第5题:
Which statements are true about EIGRP successor routes (Choose two.)()。
第6题:
Which of the following is true regarding the effect of EIGRP queries on the network design?()
第7题:
Which two statements are true regarding EIGRP?()
第8题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第9题:
Which two statements are true regarding high-availability chassis clustering?()
第10题:
Which two statements regarding asymmetric key encryption are true?()