A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
您可能感興趣的試卷
你可能感興趣的試題
Which routing protocols can be used within the enterprise network shown in the diagram?()
A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP
A. application layer
B. session layer
C. transport layer
D. network layer
E. datalink layer
F. physical layer
The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic. There is concern that a lack of router resources is impeding internetwork performance. As part of examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the default and the router IDs are shown with each router. Which routers are likely to have been elected as DR?()
A.Corp-1
B.Corp-2
C.Corp-3
D.Corp-4
E.Branch-1
F.Branch-2
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
A. packet switching
B. access layer security
C. path selection
D. VLAN membership assignment
E. bridging between LAN segments
F. microsegmentation of broadcast domains
最新試題
Which IPsec security protocol should be used when confidentiality is required?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which command encrypts all plaintext passwords?()
At which layer of the OSI model is RSTP used to prevent loops?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
How are VTP advertisements delivered to switches across the network?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()