多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE

题目
多选题
Which two steps are required for a Kompella Layer 2 VPN?()
A

Configure a site ID for each CE

B

Configure a VPN label for each VPN

C

Configure a MP-BGP session to each PE

D

Configure an Extended LDP Session to each PE


相似考题
更多“多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE”相关问题
  • 第1题:

    Which option describes the incorrect usage of the Label Distribution method?()

    • A、LDP is primarily used in internal networks of MPLS-VPN providers.
    • B、MP-BGP is used for label distribution for VPN customer routes.
    • C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.
    • D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

    正确答案:D

  • 第2题:

    What are the "bound IP addresses" used for in LDP?()

    • A、For each such address and mask /32, one label binding is created.
    • B、As the TCP endpoint, IP addresses are used by the LDP session.
    • C、These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.
    • D、These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 

    正确答案:C

  • 第3题:

    Which two steps are required for a Kompella Layer 2 VPN?()

    • A、Configure a site id for each ce.
    • B、Configure a VPN label for each VPN.
    • C、Configure a MP-bgp session to each pe.
    • D、Configure an Extended LDP Session to each pe.

    正确答案:A,C

  • 第4题:

    What is required during the initial creation of a cluster?()

    • A、 Nothing,because HACMP will discover the configuration
    • B、 The cluster name and a TCP/IP path to each of the nodes
    • C、 The cluster name and ID and a TCP/IP path to each of the nodes
    • D、 The cluster name and ID node names and a TCP/IP path to each of the nodes

    正确答案:B

  • 第5题:

    Which two mechanisms control route distribution between PE routers in a 2547bis VPN?()

    • A、Site ID
    • B、Policies
    • C、Circuit ID
    • D、Extended communities

    正确答案:B,D

  • 第6题:

    You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()

    • A、Select L2TP/IPSec on each Windows Mobilebased device.
    • B、Obtain and install a certificate on each Windows Mobilebased device.
    • C、Configure the appropriate pre-shared key on each Windows Mobilebased device.
    • D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

    正确答案:A,B

  • 第7题:

    单选题
    You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do?()
    A

    Configure a VPN server in Sydney.

    B

    Configure a VPN server in each branch office.

    C

    Configure a dial-up server in Sydney.

    D

    Configure a dial-up server in each branch office.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements accurately describe an IBGP peering session?() (Choose two.)
    A

    Peers are statically defined.

    B

    Peers exist within the same AS.

    C

    Peers must be directly connected to each other.

    D

    Peers advertise routes learned from other IBGP neighbors.


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    You are the network administrator for your company. The network consists of a single Active Directory domain with three sites named Site1, Site2, and Site3. The sites and site links are configured to use Site2 to connect Site1 and Site3. Each site contains three Windows Server 2003 domain controllers. A domaincontroller in each site is configured as a preferred bridgehead server. All user and group accounts are created in Site1. Several new users start work in Site2. When they attempt to log on to the network, the logon fails. You confirm that the user accounts are created and are visible in Site1 and Site2. You discover that the preferred IP bridgehead server in Site2 failed. You repair the server and confirm that replication is successful to Site2. You need to ensure that the failure of a single domain controller in any site will not interfere with Active Directory replication between sites.  What are two possible ways to achieve this goal?()
    A

    Configure an IP site link between Site1 and Site3.

    B

    Configure two domain controllers in each site as preferred IP bridgehead servers.

    C

    Configure two domain controllers in each site as preferred SMTP bridgehead servers.

    D

    Configure each site to have no preferred bridgehead servers.

    E

    Configure an SMTP site link between each of the sites. Assign a cost of 200 to the SMTP site link.


    正确答案: D,E
    解析: 暂无解析

  • 第10题:

    单选题
    What are the "bound IP addresses" used for in LDP?()
    A

    For each such address and mask /32, one label binding is created.

    B

    As the TCP endpoint, IP addresses are used by the LDP session.

    C

    These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.

    D

    These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly. 


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    What are the basic configuration steps to enable IS - IS?()
    A

    Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

    B

    Configure the net sy stem - id and the network net - id commands under routerisis.

    C

    Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

    D

    Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

    E

    Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Company.com has two POWER5 servers. They want the two servers’ virtual Ethernets to appear on the same IP subnet. Which of the following will connect the client virtual Ethernet adapters to the physical Ethernet switch connecting the two servers?()
    A

    Configure a Shared Ethernet Adapter on the Virtual I/O Server.

    B

    Use the same virtual LAN ID on each LPAR.

    C

    Set up IP routing through an LPAR on each system.

    D

    Set up an IP firewall through an LPAR on each system.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A company has a Frame Relay WAN with one central - site router and 100 branch office routers. A partial mesh of PVCs exists: one PVC between the central site and each of the 100 branch routers. Which of the following could be true about the number of EIGRP neighbor ships?()

    • A、A partial mesh totaling 100: one between the central - site router and each of the 100 branches.
    • B、A full mesh  -  (101 * 100) / 2 = 5050 - One neighborship between each pair of routers.
    • C、101 - One between each router (including the central site) a nd its nearby PE router.
    • D、None of the answers is correct.

    正确答案:A

  • 第14题:

    PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()

    • A、an LSP for each local CE device
    • B、an LSP for each remote PE device
    • C、an LSP for each remote CE device
    • D、an LSP for each CE facing interface

    正确答案:B

  • 第15题:

    In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()

    • A、IP address and IP label of each service and boot interface in the cluster
    • B、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the node
    • C、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gateway
    • D、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

    正确答案:B

  • 第16题:

    Which two steps are required for a Kompella Layer 2 VPN?()

    • A、Configure a site ID for each CE
    • B、Configure a VPN label for each VPN
    • C、Configure a MP-BGP session to each PE
    • D、Configure an Extended LDP Session to each PE

    正确答案:A,C

  • 第17题:

    Your company has 10 offices.  The offices connect to the Internet by using a WAN link.  The offices connect to each other by using a VPN connection.  An Active Directory site exists for each office. You plan to deploy Exchange Server 2010. Each site will contain two Exchange Server 2010 servers.  You need to recommend the placement of domain controllers and global catalog servers to meet thefollowing requirements: .Minimize the number of domain controllers .Must be able to deliver e-mail messages between users of the same office, if a domain controller and aWAN link fail simultaneously What should you recommend?()

    • A、In each site, install two global catalog servers.
    • B、In each site, install two domain controllers. Enable Universal Group Membership caching for each site.
    • C、In each site, install two domain controllers. Create a publishing point for an offline address list on one Exchange server in each site.
    • D、In each site, install one domain controller that is configured as a global catalog server.Enable Universal Group Membership caching for each site.

    正确答案:A

  • 第18题:

    You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()

    • A、 A single forest with one tree, and one domain
    • B、 A single forest with one tree two domain
    • C、 A single forest with two trees, each with a single domain
    • D、 Two forests, each with a single tree and a single domain
    • E、 Two forests, each with two trees, with a single domain in each tree.

    正确答案:A

  • 第19题:

    单选题
    You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()
    A

    Configure a demand-dial router.

    B

    Create multiple Active Directory site links.

    C

    Configure a VPN connection between each branch office.

    D

    Install an Internet Authentication Service (IAS) server in each branch office.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()
    A

    MPLS LSP

    B

    ATM tunnel

    C

    GRE tunnel

    D

    IPSEC tunnel

    E

    L2TPv3 session


    正确答案: E,D
    解析: 暂无解析

  • 第21题:

    单选题
    What is required during the initial creation of a cluster?()
    A

     Nothing,because HACMP will discover the configuration

    B

     The cluster name and a TCP/IP path to each of the nodes

    C

     The cluster name and ID and a TCP/IP path to each of the nodes

    D

     The cluster name and ID node names and a TCP/IP path to each of the nodes


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()
    A

    Select L2TP/IPSec on each Windows Mobilebased device.

    B

    Obtain and install a certificate on each Windows Mobilebased device.

    C

    Configure the appropriate pre-shared key on each Windows Mobilebased device.

    D

    Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two steps are required for a Kompella Layer 2 VPN?()
    A

    Configure a site id for each ce.

    B

    Configure a VPN label for each VPN.

    C

    Configure a MP-bgp session to each pe.

    D

    Configure an Extended LDP Session to each pe.


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two steps are required for a Kompella Layer 2 VPN?()
    A

    Configure a site ID for each CE

    B

    Configure a VPN label for each VPN

    C

    Configure a MP-BGP session to each PE

    D

    Configure an Extended LDP Session to each PE


    正确答案: D,C
    解析: 暂无解析