单项选择题
Network topology exhibit:
In this network segment, the two routers on the network are configured for GLBP (Gateway LoadBalancing Protocol). What can be said about this?()
A.The hosts will have different default gateway IP addresses and different MAC addresses foreach rtouter
B.The default gateway address of each host should be set to the virtual IP address
C.The hosts will learn the proper default gateway IP address from Router R1
D.The default gateway address of each host should be set to the real IP address of the router
E.None of the other alternatives apply
相关考题
-
多项选择题
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
A.Router A is responsible for answering ARP requests sent to the virtual IP address.
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC addressof Router A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG -
单项选择题
Routers R1 and R2 are configured for HSRP as shown below: Router R1: interface ethernet 0 ip address 20.6.2.1 255.255.255.0 standby 35 ip 20.6.2.21 standby 35 priority 100 interface ethernet 1 ip address 20.6.1.1.2 255.255.255.0 standby 34 ip 20.6.1.21 Router R2: interface ethernet 0 ip address 20.6.2.2 255.255.255.0 standby 35 ip 20.6.2.21 interface ethernet 1 ip address 20.6.1.1.1 255.255.255.0 standby 34 ip 20.6.1.21 standby 34 priority 100 You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice veryfrequent HSRP group state transitions. What is the most likely cause of this?()
A.physical layer issues
B.no spanning tree loops
C.use of non-default HSRP timers
D.failure to set the command standby 35 preempt -
多项选择题
WhichtwostatementsaretrueabouttheCiscoClassic(CBAC)IOSFirewallset?()
A.It can be used to block bulk encryption attacks
B.It can be used to protect against denial of service attacks
C.Traffic originating from the router is considered trusted, so it is not inspected
D.Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
E.Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
