Refer to the exhibit. EIGRP has been configured on routers R1 and R2. However, R1 does notshow R2 as a neighbor and does not accept routing updates from R2. What could be the cause ofthe problem?()
A.The no auto-summary command has not been issued under the EIGRP process on bothrouters
B.Interface E0 on router R1 has not been configured with a secondary IP address of 10.1.2.1/24
C.EIGRP cannot exchange routing updates with a neighbor’s router interface that is configuredwith two IP addresses
D.EIGRP cannot form neighbor relationship and exchange routing updates with a secondaryaddress
您可能感興趣的試卷
你可能感興趣的試題
Based on the above configuration, which of the following BGP statements would inject the 10.10.0.0/16 prefix into the BGP routing table()
A.network 10.0.0.0
B.network 10.10.0.0 mask 255.255.0.0
C.network 10.10.10.1 mask 255.255.255.255
D.network 10.10.10.0 mask 255.255.255.0
E.network 10.0.0.0 mask 255.255.0.0
Study the exhibit below carefully:
If the configuration shown below is added to Router1, which three route entries will EIGRPadvertise to neighboring routers?()
router eigrp 10
network 10.0.0.0
eigrp stub
A.192.168.20.0/24
B.10.1.2.0/24
C.10.1.1.0/24
D.10.1.3.0/24
E.10.0.0.0/8
A.The IBGP routers must always be fully meshed.
B.The IBGP routers can be in a different AS.
C.The IBGP routers must be directly connected.
D.TThe IBGP routers do not need to be directly connected.
E.None of the other alternatives apply are true
A network administrator is troubleshooting an EIGRP connection between RouterA, IP address10.1.2.1, and RouterB, IP address 10.1.2.2. Given the debug output on RouterA, which twostatements are true?()
A.RouterA received a hello packet with mismatched metric-calculation mechanisms
B.RouterA received a hello packet with mismatched authentication parameters
C.RouterA will form an adjacency with RouterB
D.RouterA received a hello packet with mismatched autonomous system numbers
E.RouterA received a hello packet with mismatched hello timers
F.RouterA will not form an adjacency with RouterB
The following command was issued on Router 2:
Given the above output shown above, which statement is true?()
A.192.168.1.0 is a redistributed route into EIGRP
B.192.168.1.0 is a summarized route
C.192.168.1.0 is a static route
D.192.168.1.0 is equal path load balancing with 172.16.1.0
E.None of the other alternatives apply
The EIGRP network is displayed in the following topology diagram:
You work as a network technician. Study the exhibits carefully. If the command "variance 3" wasadded to the EIGRP configuration of R5, which path or paths would be chosen to route traffic fromR5 to network X?()
A.R5-R2-R1
B.R5-R2-R1 and R5-R3-R1
C.R5-R3-R1 and R5-R4-R1
D.R5-R2-R1,R5-R3-R1, and R5-R4-R1
A.Use the service-policy command to adjust the QOS policy to allow the route to propagate.
B.Clear the BGP session.
C.Use the release BGP routing command.
D.Change both the inbound and outbound policy related to this route.
E.None of the other alternatives apply
The network is shown below, along with the relevant router configurations:
With the topology found in the graphic, what will the R1 loopback 0 be in the R3 routing table?()
A.It will show up in the routing table as D 10.0.0/8
B.It will show up in the routing table as D EX 10.0.0.0/8
C.It will show up in the routing table as D 10.0.0./24
D.It will not show up in R3 routing table because there is no network command on R1
A.show ip bgp
B.show ip bgp paths
C.show ip bgp peers
D.show ip bgp summary
E.show ip bgp protocols
A.The 172.16.1.1 neighbor is down.
B.The prefix 10.10.10.0/24is not a’connected’route.
C.This route is not a BGP learned route.
D.The network command is wrong.
E.None of the other alternatives apply
最新試題
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)
Drag the DSL local loop topic on the left to the correct descriptions on the right.
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()