問答題What 2 methods are available for overcoming the BGP full mesh requirement?

您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth,a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()

A.Pay special attention to the VTP revision number, because the higher value takes the priority.
B.Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C.A trunk should be established between the new switch and switches 1 and 3 as VTP only runs over trunk links.
D.Set at least the VTP domain name and password to get the new switch synchronized.
E.An ISL trunk should be established between the new switch and switches 1 and 3,because VTP only runs over ISL.
F.Pay special attention to the VTP revision number, because the lower value takes the priority.

2.多項選擇題Which two of these elements need to be configured prior to enabling SSH?()

A.hostname
B.loopback address
C.default gateway
D.domain name
E.SSH peer address

3.單項選擇題When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()

A.the number of packets that are discarded because they exceed the maximum packet size of the medium
B.errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
C.the number of packets that are discarded because they are smaller than the minimum packet size of the medium
D.the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
E.the number of times that the interface requested another interface within the router to slow down

4.單項選擇題If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name

5.單項選擇題If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication,connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

A.ip http client secure-ciphersuite 3des-ede-cbc-sha
B.ip https max-connections 10
C.ip http timeout-policy idle 30 life 120 requests 100
D.ip http client secure-trustpoint trustpoint-name