CCNA系列认证

多选题Which two statements are true regarding EIGRP?()APassive routes are in the process of being calculated by DUAL.BEIGRP supports VLSM, route summarization, and routing update authentication.CEIGRP exchanges full routing table information with neighboring

题目
多选题
Which two statements are true regarding EIGRP?()
A

Passive routes are in the process of being calculated by DUAL.

B

EIGRP supports VLSM, route summarization, and routing update authentication.

C

EIGRP exchanges full routing table information with neighboring routers with every update.

D

If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.

E

A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

参考答案和解析
正确答案: E,B
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第2题:

Which two statements are true regarding the role of the Routing Engine (RE)?()

  • A、The RE controls and monitors the chassis.
  • B、The RE manages the Packet Forwarding Engine (PFE).
  • C、The RE receives a copy of the forwarding table from the forwarding plane.
  • D、The RE implements class of service (COS).

正确答案:A,B

第3题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第4题:

Which two statements are true regarding L2TP? ()(Choose two.)

  • A、Tunnels are initiated by the LAC
  • B、Tunnels are initiated by the LNS
  • C、By default, subscriber authentication occurs on the LNS
  • D、By default, subscriber authentication occurs on the LAC

正确答案:A,C

第5题:

Which statements are true about EIGRP successor routes (Choose two.)()。

  • A、A successor route is used by EIGRP to forward traffic to a destination.
  • B、Successor routes are saved in the topology table to be used if the primary route fails.
  • C、Successor routes are flagged as "active" in the routing table.
  • D、A successor route may be backed up by a feasible successor route.
  • E、Successor routes are stored in the neighbor table following the discovery process.

正确答案:A,D

第6题:

Which of the following is true regarding the effect of EIGRP queries on the network design?()

  • A、 EIGRP queries will be the most significant issue with respect to stability and convergence 
  • B、 EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a nexthop AD that is greater than the FD of the current successor route 
  • C、 EIGRP queries will only increase the convergence time when there are no EIGRP stubsdesigned in the network

正确答案:C

第7题:

Which two statements are true regarding EIGRP?()

  • A、Passive routes are in the process of being calculated by DUAL.
  • B、EIGRP supports VLSM,route summarization,and routing update authentication.
  • C、EIGRP exchanges full routing table information with neighboring routers with every update.
  • D、If the feasible successor has a higher advertised distance than the successor route,it becomes theprimary route.
  • E、A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

正确答案:B,E

第8题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第9题:

Which two statements are true regarding high-availability chassis clustering?()

  • A、A chassis cluster consists of two devices.
  • B、A chassis cluster consists of two or more devices.
  • C、Devices participating in a chassis cluster can be different models.
  • D、Devices participating in a chassis cluster must be the same models

正确答案:A,D

第10题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

更多相关问题