A static route that points towards the Cisco Easy VPN server is created on the remote client.
A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
A default route is injected into the route table of the remote client.
A default route is injected into the route table of the Cisco Easy VPN server.
第1题:
A.It is any alternative path for best effort traffic.
B.It is the next hop of the active route to a directly attached device.
C.It is the next hop for a route from a qualified protocol.
D.It is an alternative next hop for a static route.
第2题:
A. The i su 10.1.0.0/23 route is a suppressed route.
B. The i su 10.1. 0.0/23 route is a summary route.
C. The i su 10.1.0.0/23 route is an IS - IS external route.
D. The R1 IS - IS router is an ASBR.
E. The R1 IS - IS router is an ABR that belongs to multiple IS - IS areas.
F. The R1 IS - IS router is performing route aggregation and is suppressing the more specific 10.1.0.0/23 prefix.
第3题:
A. All routes are accepted.
B. All routes are rejected.
C. A 172.27.0.0/24 route will be accepted.
D. A 172.27.0.0/16 route will be accepted.
第4题:
Which of the following BEST describes a hub?()
第5题:
Which type of EIGRP route entry describes a feasible successor?()
第6题:
A. Establish a new theory of probable cause.
B. Reverse the change.
C. Implement the next logical change.
D. Perform a root cause analysis.
第7题:
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
第8题:
A. Traffic matching the default route will use 10.1.1.1 as the next hop.
B. Traffic matching the default route will use 10.1.1.254 as the next hop.
C. Traffic matching the default route will be load-balanced per packet across both next hops.
D. Traffic matching the default route will be load-balanced per flow across both next hops.
第9题:
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
第10题:
Which three packet interception methods are configurable in WX devices?() (Choose three.)