A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()A、rout

题目

A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()

  • A、route redistribution
  • B、import and export using route descriptors
  • C、import and export using route targets
  • D、Cisco MPLS Traffic Engineering
参考答案和解析
正确答案:C
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which attribute allows a VRF to accept VPN routes from another VRF?()

A. route list

B. route origin

C. route target

D. route distinguisher


参考答案:C

第2题:

Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()

A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.

B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.

C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.

D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.


参考答案:B

第3题:

You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.

Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.

However, users report that they can see EzonexamDocs when they browse for shared folders.

How should you solve this problem?

A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.

B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.

C.Change the share name to EzonexamDocs #.

D.Change the share name to EzonexamDocs $.


正确答案:D
解析:Explanation: Appending a dollar sign ($) to a share name hides the share. A share that is followed by a dollar sign ($) indicates that the share is hidden from view when users access utilities such as My Network Places and browse network resources.

Incorrect answers:
A: The Read share permission allows a user to view and execute files in the shared folder. This is not what is
required. This will not hide the share.

B: The NTFS Read permission allows the following rights: List the contents of a folder and read the data in a folder's files, See a file's or folder's attributes and View ownership. This is not what is required. This will not hide the share. Users will see the share, but get an "Access Denied" message.

C: This sign is used when working with user account templates. The share will be visible with the name EzonexamDocs#.

第4题:

Which of the following attributes allows a VRF to accept VPN routes from another VRF? ()

  • A、 route list
  • B、 route origin
  • C、 route target
  • D、 toute distinguisher

正确答案:C

第5题:

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

A. It resembles a Layer 2 bridge.

B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

C. Inline interfaces which have no IP addresses cannot be detected.

D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


参考答案:A, C

第6题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第7题:

Refer to the exhibit. IP multicast for group address 224.1.1.1 has been enabled on all router s in the network. Hosts on Network A receive the multicast traffic. However, hosts on Network B do not. On the basis of outputs provided, what could be the cause of the problem? ()

A. The route to 224.69.15.0/24 will be out Ethernet 0

B. The reverse path forwarding (RPF) for the route 224.2.0.1 failed to find the interface on which the multicast packet was rece ived

C. Multicast route to 224.69.15.0/24 was added to the mroute table and created by a source directly connected to the router

D. Multicast route to 10.16.0.0/16 was added to the mroute table and created by a source directly connected to the router

E. This router received an IGMP host report from a group member or a PIM join message


参考答案:A

第8题:

Users can define policy to control traffic flow between which two components? ()(Choose two.)

A. from a zone to the router itself

B. from a zone to the same zone

C. from a zone to a different zone

D. from one interface to another interface


参考答案:B, C

第9题:

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.

B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.

C. Use class-based policing to limit the peer-to-peer traffic rate.

D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C


参考答案:C

第10题:

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

  • A、Router routes traffic between different networks and a switch does not
  • B、The new switch is faulty and needs to be replaced and configured correctly
  • C、The firewall needs to be setup to allow traffic to reach the Internet
  • D、The switch needs to be setup to forward data traffic to the Internet

正确答案:A

更多相关问题