單項選擇題Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall? ()

A. Attempt to TELNET from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If telnet works, BGP will work, since telnet and BGP both use TCP to transport data.
B. Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport packets.
C. There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work or not, other than trying to start the peering session.
D. There is no way to make BGP work across a firewall.


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題While deploying a new switch, you accidently connect ports 3/12 and 3/18 together, creating a loop. STP detected it and placed port 3/18 in blocking mode. Why did STP not place port 3/12 in blocking mode instead? ()

A. Port 3/12 was already up and forwarding before the loop was created.
B. Port priority is based on lowest priority and lowest port number.
C. You connected the wire on port 3/18 last.
D. None of the above, it is purely random.

3.單項選擇題After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()

A.Increase memory allocation for ACLs.
B.Remove all entries from the ACL and use a single permit ip any any statement.
C.Remove the log keyword from each ACL entry.
D.Reboot the device after the ACL has been applied.

5.單項選擇題Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()

A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs

最新試題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

Which two statements are true about RED?()

題型:多項選擇題

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()

題型:單項選擇題

An expanding company is deploying leased lines between its main site and two remote sites. Thebandwidth of the leased lines is 128kb/s each,terminated on different serial interfaces on the main router.These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs,and has therefore reserved sufficient bandwidth in a low latency queue oneach interface for the VOIP traffic. Users now complain about bad voice quality although no drops areobserved in the low latency queue. What action will likely fix this problem?()

題型:單項選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()

題型:單項選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項選擇題

When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()

題型:單項選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項選擇題