题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-26 03:36:59

[多项选择]What are two characteristics of the OSPF process identifier?()
A. It is needed to identify a unique instance of an OSPF database.
B. It is an optional parameter only necessary if multiple OSPF processes are used.
C. It is locally significant.
D. It is globally insignificant
E. All routers in the same OSPF area must have the same process ID to exchange routing information.

更多"What are two characteristics of the"的相关试题:

[多项选择]What are two benefits of using a single OSPF area network design?()
A. it reduces the number of required OSPF neighbor adjacencies
B. It reduces the types of LSAs that are generated
C. It is less CPU intensive for routers in the single area
D. It increases LSA response times.
E. It removes the need for virtual links
[单项选择]What OSPF command, when configured, will include all interfaces into area 0?()
A. network 0.0.0.0 255.255.255.255 area 0
B. network 0.0.0.0 0.0.0.0 area 0
C. network 255.255.255.255 0.0.0.0 area 0
D. network all-interfaces area 0
[多项选择]What are the characteristics of the process of documenting the layers of an existing network? ()
A. begins with gathering organizational input that may be inaccurate
B. begins with gathering organizational input that does not need to be supplemented by a network audit
C. requires a network audit to support some upgrade decisions
D. requires a network audit to support any network restructuring
E. provides reliable input for verifying network consistency
F. does not provide reliable input for designing changes
[单项选择]What is the default protocol preference for OSPF internal routes?()
A. 10
B. 15
C. 150
D. 160
[多项选择]What are two of the implementation ratings found in the SBR Value Assessment?()
A. production
B. growth
C. foundation
D. expansion
E. base
[多项选择]What are two characteristics of Telnet (Choose two.)()。
A. Itsendsdataincleartextformat.
B. ItisnolongersupportedonCisconetworkdevices.
C. ItismoresecurethanSSH
D. Itrequiresanenterpriselicenseinordertobeimplemented.
E. ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
[单项选择] You are running OSPF between two ERX Edge Routers across an OC-12c link with HDLC encapsulation. How many designated routers are present for this link?()
A. 0
B. 1
C. 2
D. 3
[多项选择]What are two Junos processes?()
A. OSPF SPF daemon (ospfd)
B. SNMP daemon (snmpd)
C. BGP daemon (bgpd)
D. Routing protocols daemon (rdp)
[多项选择]What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth.
B. It profiles based on loss priority.
C. It prevents traffic loss through buffering.
D. It prevents global synchronization with tail drops.
[多项选择]What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation
[多项选择]What are two characteristics of the relationship between the Cisco PIN architecture and Cisco Validated Designs? ()(Choose two.)
A. Cisco is focusing on Cisco Validated Designs as a means to driving integrated networks.
B. Cisco is focusing on the PIN architecture as a means to driving integrated networks.
C. The Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.
D. The Cisco Validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.
E. Cisco Validated Designs can be implemented quickly without customer input.
[多项选择]What are two functions associated with JUNOS software class of service?()
A. Manage ingress bandwidth.
B. Mark packets for special handling.
C. Manage congestion by intelligently dropping traffic.
D. Classify Frame Relay QoS packets into an equivalent IP CoS environment.
[多项选择]What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
[多项选择]What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
A. Enabling online collaboration among research personnel
B. Delivering a strategic business update from the CEO to all personnel
C. Enabling an interactive virtual classroom for sales personnel in remote locations
D. Delivering information about changes in health benefit enrollment to all personnel

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码