單項選擇題If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the  routes?()

A. 0
B. 1
C. 10
D. 20


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. Which statement is true?()

A.Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor
B.Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor
C.Only traffic with a destination from 10.10.0.0/19 will be permitted
D.Only traffic going to 10.10.0.0/19 will be permitted

2.單項選擇題

Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()

A.switchport priority extend trust
B.switchport priority extend cos 2
C.switchport priority extend cos 11
D.mls qos cos 2
E.mls qos cos 2 override

3.多項選擇題Which two statements about voice VLANs are correct?()

A.Voice VLANs eliminate the need for QoS configuration
B.Voice VLANs are used on trunk links to eliminate the need for QoS CoS markings
C.Voice VLANs are mainly used to reduce the number of access switch ports that are used in the network
D.Voice VLANs can be configured to forward existing CoS priorities or override them
E.Voice VLANs are mainly used between access layer switches and distribution layer switches
F.Voice VLANs can be configured on Layer 2 ports only

4.多項選擇題Which two statements are true about voice packets in a LAN? (Choose two.)  ()

A. Voice traffic data flow involves large volumes of large packets.
B. Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
C. Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
D. Voice packets are very sensitive to delay and jitter.
E. Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

5.多項選擇題Which two statements are true about voice VLANs?()

A.Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
B.Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
C.Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
D.Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
E.Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
F.Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

6.單項選擇題Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

A. The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.
B. LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.
C. LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.
D. LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

7.多項選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG

8.單項選擇題

Refer to the exhibit. Which statement is true about a voice VLAN?()

A.Physically the voice network and the data network are separate
B.The voice traffic will normally be on a different IP subnet than will the data traffic
C.End user intervention is necessary to place the phone into the proper VLAN
D.The same security policy should be implemented for both voice and data traffic
E.The data VLAN must be configured as the native VLAN

9.多項選擇題Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  

A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter  and the access point, manage authentication to the wireless network, and enable data encryption.
B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a  time.
D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.

10.單項選擇題Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()

A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration

最新試題

Which two statements about voice VLANs are correct?()

題型:多項選擇題

A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

題型:單項選擇題

Which two Aironet enterprise solution statements are true?()

題型:多項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the  roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()

題型:多項選擇題

Refer to the exhibit. Which statement is true?()

題型:單項選擇題

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()

題型:單項選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology?()

題型:多項選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

題型:多項選擇題