單項(xiàng)選擇題

Which routing protocol best fits these requirements?()
- Supported by multiple router vendors 
- Requires minimum router CPU and memory resources 
- Uses a simple routing metric 
- Supports manual or automatic route summarization

A. EIGRP
B. OSPF
C. IS-IS
D. RIPv2


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is a criteria of the enterprise composite network model?()

A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model

2.單項(xiàng)選擇題What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()

A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required

4.多項(xiàng)選擇題You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()

A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

5.單項(xiàng)選擇題Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()

A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. 
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.

6.多項(xiàng)選擇題Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address

最新試題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項(xiàng)選擇題

What are two characteristics of GSS? ()

題型:多項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:?jiǎn)雾?xiàng)選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:?jiǎn)雾?xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

What is the traditional mode for a firewall?()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項(xiàng)選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項(xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題