單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()

A.If another path advertises the 6.6.6.0/24 path and has the default local preference, that path is more preferred
B.The command neighbor send-community is configured on BGP neighbor 10.10.23.3
C.The route 10.10.23.3 is not being advertised to other BGP neighbors
D.Route 6.6.6.0/24 is learned by an IBGP peer


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true?()

A.Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor
B.Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor
C.Only traffic with a destination from 10.10.0.0/19 will be permitted
D.Only traffic going to 10.10.0.0/19 will be permitted

2.多項(xiàng)選擇題Which two statements are true about network voice traffic? (Choose two.)()

A. Voice traffic is affected more by link speed than FTP traffic is.
B. Voice traffic is affected more by packet delays than FTP traffic is.
C. Voice streams involve larger packet sizes than most TCP network traffic involves.
D. Voice traffic is more sensitive to packet loss than TCP network traffic is.
E. Voice traffic requires QOS mechanisms only in heavily loaded network segments.

3.單項(xiàng)選擇題Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()

A. The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.
B. LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.
C. LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.
D. LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

4.多項(xiàng)選擇題Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

A. access point certification and software control
B. compression and Layer 3 address mapping
C. Layer 3 addressing and distribution
D. packet encapsulation, fragmentation, and formatting
E. SNMP monitoring services

5.單項(xiàng)選擇題A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

A. probe request/response, authentication request/response, association request/response
B. association request/response, authentication request/response, probe request/response
C. probe request/response, association request/response, authentication request/response
D. association request/response, probe request/response, authentication request/response

最新試題

A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()

題型:?jiǎn)雾?xiàng)選擇題

Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

題型:多項(xiàng)選擇題

Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about voice VLANs?()

題型:多項(xiàng)選擇題

Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()

題型:?jiǎn)雾?xiàng)選擇題

If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()

題型:多項(xiàng)選擇題