更多"Given the following MPLS L2 configu"的相关试题:
[多项选择]The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()
A. The default administrative distance is used.
B. The command is used to establish a static route.
C. The command is used to configure the router interfaces.
D. The command is used to establish a stub network.
E. The subnet mask for the source address is 255.255.255.0
[多项选择]The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()
A. The command is used to establish a static route.
B. The default administrative distance is used.
C. The command is used to configure the default route.
D. The subnet mask for the source address is 255.255.255.0
E. The command is used to establish a stub network
[单项选择] Given the following configuration on the Paris PE router: routing-instance {VPN-A-Paris-Munich {instance-type vrf;interface so-6/0/0.0;interface so-6/0/1.0;route-distinguisher 65535:0;vrf-target target:65535:101;routing-options {static {route 172.16.0.0/16 next-hop so-6/0/0.0;route 172.17.0.0/16 next-hop so-6/0/1.0;} Which community value would the Munich PE router match against in an import policy associated with this VPN?()
A. 101
B. 65535:0
C. 65535:101
D. target:65535:101
[单项选择]Given the following LSP configuration, which statement is true?()label-switched-path lsp-xyz { to 10.200.1.1; primary path1; secondary path2; secondary path3; no-cspf; } path path1 { 10.200.10.1 strict; } path path2 { 10.200.20.1 strict; } path path3 { 10.200.30.1 loose; }
A. The router will use path1 when it is available and stable.
B. The router will use path3 when it is available and stable.
C. The router will attempt to establish path2 only when path1 and path3 are down.
D. The router will attempt to establish path1 only when path2 and path3 are down.
[单项选择]Which configuration command sets the MPLS interface bandwidth to 15 Mbps?()
A. set bandwidth 15
B. mpls bandwidth 15
C. set bandwidth 15000
D. mpls bandwidth 15000
[单项选择] Given the following configuration, what command can be used to determine the physical path that traffic will be sent out upon?() Port-profile type Ethernet name vm-data Switchport mode trunk Switchport trunk allowed vlan 200-210 Channel-group auto mode on mac-pinning State enabled Vmware port-group No shut Port-profile type vethernet name vlan-200 Switchport mode access Switchport vlan 200 State enabled Vmware port-group No shut
A. module vem X execute vemcmd show trunk
B. show module 3 internal pinning
C. module vem X execute vemcmd show port
D. show module vem mapping
E. show interface vethX pinning
[单项选择]Which CLI command is used to enable MPLS Fast Reroute on a ingress router?()
A. mpls fast reroute
B. mpls fast-reroute
C. enable mpls fast-reroute
D. tunnel mpls fast-reroute
[多项选择]What are two advantages to customers with L2 MPLS VPNs? ()(Choose two.)
A. Service provider has routing control.
B. Customers control their own routing.
C. Can communicate protocols other than IP.
D. Allows them to use separate networks for IP and VPN traffic.
[单项选择]Which CLI command displays the active L2TP sessions on an LAC?()
A. show subscriber
B. show l2tp tunnel
C. show l2tp session
D. show tunnel session
[单项选择]Which CLI command shows whether an L2TP Tunnel Switch profile is applied?()
A. l2tp tunnel test
B. show subscribers
C. show aaa domain-map
D. show l2tp destination profile
[单项选择] The following configuration commands exist only in an implementation plan document. An engineer does a copy/paste of these commands into configuration mode on Router R1. Which of the following answers is m ost accurate regarding the results?() ip sla 1 icmp - echo 1.1.1.1 source -ip 2.2.2.2 ip sla schedule 1 start - time now life forever
A. The SLA operation will be configured but will not start until additional commands are used
B. The SLA operation is not comp letely configured so it will not collect any datA
C. The SLA operation is complete and working, collecting data into the RTTMON MIB
D. The SLA operation is complete and working but will not store the data in the RTTMON MIB without more configuration
[单项选择]Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()
A. Baseline configuration
B. Logical network diagram
C. Network policy
D. Wiring schematic
[单项选择] An engineer has added the following configuration snippet to an implementation planning document. The configuration will be added to Router R1, whose Fa0/0 interface connects to a LAN to which Routers R2 and R3 also connect. R2 and R3 are already EIGRP neighbors with each of her. Assuming the snippet shows all commands on R1 related to EIGRP authentication, which answer lists an appropriate comment to be made during the implementation plan peer review?() key chain fred key 3 key - string whehew interface fa0/0 ip authenticat ion key - chain eigrp 9 fred
A. The configuration is missing one authentication - related configuration command
B. The configuration is missing two authentication - related configuration commands
C. Authentication type 9 is not supported; type 5 should be u sed insteaD
D. The key numbers must begin with key 1, so change the key 3 command to key 1
[多项选择] Look at the following configuration below and select the statements that are true.() RD2(config)#router ospf 100 RD2(config - router)# distance 180 10.1.10.1 0.0.0.0 match - me RD2(config -router)#! RD2(config - router) #ip access - list standard match - me RD2(config - std - nacl)# permit host 172.16.0.0
A. OSPF will have an AD of 180 for routes from 10.1.10.1 in the 172.16.0.0/16 range.
B. The neighbor RID is 10.1.10.1
C. OSPF will have an AD of 180 for all routes.
D. The local RID is 10.1.10.1
[单项选择] The following configuration exists on a router on one end of an IPv6 tunnel. Although the configuration added so far is correct, the configuration is incomplete. Which type of tunnel is most likely to be intended by the network engineer?() interface loopback 1 ip address 192.168.1.1 255.255.255.255 interface tunnel 2 ipv6 address 2002:C0A8:10 1::1/64 tunnel source loopback 1
A. Automatic 6to4
B. Manually configured tunnel
C. ISATAP
D. GRE
[单项选择]The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
A. ermit all packet smatching the first three octets of the source address to all destinations
B. permit all packet matching the last octet of the destination address and accept all source addresses
C. permit all packet matching the host bits in the source address to all destinations
D. permit all packet from the third subnet of the network address to all destinations