单选题Which statement describes Reverse Route Injection (RRI)?()A A static route that points towards the Cisco Easy VPN server is created on the remote client.B A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN cl

题目
单选题
Which statement describes Reverse Route Injection (RRI)?()
A

A static route that points towards the Cisco Easy VPN server is created on the remote client.

B

A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.

C

A default route is injected into the route table of the remote client.

D

A default route is injected into the route table of the Cisco Easy VPN server.


相似考题
更多“Which statement describes Reverse Route Injection (RRI)?()”相关问题
  • 第1题:

    Based on the show ip route isis output on R1, which statement is true? ()

    A. The i su 10.1.0.0/23 route is a suppressed route.

    B. The i su 10.1. 0.0/23 route is a summary route.

    C. The i su 10.1.0.0/23 route is an IS - IS external route.

    D. The R1 IS - IS router is an ASBR.

    E. The R1 IS - IS router is an ABR that belongs to multiple IS - IS areas.

    F. The R1 IS - IS router is performing route aggregation and is suppressing the more specific 10.1.0.0/23 prefix.


    参考答案:B

  • 第2题:

    Which type of EIGRP route entry describes a feasible successor?()

    • A、a primary route,stored in the routing table
    • B、a backup route,stored in the routing table
    • C、a backup route,stored in the topology table
    • D、a primary route,stored in the topology table

    正确答案:C

  • 第3题:

    Which of the following BEST describes a hub?()

    • A、Determines the best route to transmit data
    • B、Inspects traffic and accepts or declines transmission
    • C、Broadcasts data to specific network devices
    • D、Broadcasts data to all network devices

    正确答案:D

  • 第4题:

    Which statement correctly describes IPsec VPN backup technology?()

    • A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocol
    • B、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworks
    • C、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP address
    • D、The cypto isakmp keepalive command is used to configure stateless failover

    正确答案:D

  • 第5题:

    When an administrator is troubleshooting a system, which of the following describes the NEXT course of action if a change does not solve the problem?()

    • A、 Establish a new theory of probable cause.
    • B、 Reverse the change.
    • C、 Implement the next logical change.
    • D、 Perform a root cause analysis.

    正确答案:B

  • 第6题:

    Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?()

    • A、filter
    • B、forward
    • C、next-hop
    • D、next-interface

    正确答案:D

  • 第7题:

    单选题
    Which statement accurately defines the role of a Qualified Next Hop?()
    A

    It is any alternative path for best effort traffic.

    B

    It is the next hop of the active route to a directly attached device.

    C

    It is the next hop for a route from a qualified protocol.

    D

    It is an alternative next hop for a static route.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    When an administrator is troubleshooting a system, which of the following describes the NEXT course of action if a change does not solve the problem?()
    A

     Establish a new theory of probable cause.

    B

     Reverse the change.

    C

     Implement the next logical change.

    D

     Perform a root cause analysis.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
    A

     RADIUS or LDAP

    B

     an internal router running EIGRP

    C

     Reverse Route Injection and OSPF or RIPv2

    D

     the VPN appliance to be deployed in line with the firewall


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    The amount of fuel delivered for each cycle must be in accordance with the engine load, and the same quantity of fuel must be delivered to each cylinder for each power stroke at that load.Which of the following statements describes this requirement?()
    A

    Proper timing

    B

    Accurate metering

    C

    Suitable injection rate

    D

    Suitable atomization rate


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement describes the rule of split horizon?()
    A

    Only routers can split boundaries (horizons) between concentric networks.

    B

    All distance vector protocols require fall back routers that may cause momentary loops as the topology changes.

    C

    Networks can only remain fully converged if all information about routers is sent out all active interfaces.

    D

    Information about a route should not be sent back in the direction from which the original update come.

    E

    Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which type of EIGRP route entry describes a fesible successor?()
    A

    a primary route,stored in the routing table

    B

    a backup route,stored in the routingt able

    C

    a backup route,stored in the topology table

    D

    A primary route,stored in the topology table


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

    • A、 RADIUS or LDAP
    • B、 an internal router running EIGRP
    • C、 Reverse Route Injection and OSPF or RIPv2
    • D、 the VPN appliance to be deployed in line with the firewall

    正确答案:C

  • 第14题:

    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()

    • A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1
    • B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
    • C、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
    • D、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

    正确答案:A

  • 第15题:

    Which three packet interception methods are configurable in WX devices?() (Choose three.)

    • A、OSPF
    • B、WCCP
    • C、policy based routing
    • D、route injection using RIPv1
    • E、route injection using RIPv2

    正确答案:B,C,E

  • 第16题:

    Which statement describes Reverse Route Injection (RRI)?()

    • A、A static route that points towards the Cisco Easy VPN server is created on the remote client.
    • B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
    • C、A default route is injected into the route table of the remote client.
    • D、A default route is injected into the route table of the Cisco Easy VPN server.

    正确答案:B

  • 第17题:

    Which statement accurately defines the role of a Qualified Next Hop?()

    • A、It is any alternative path for best effort traffic.
    • B、It is the next hop of the active route to a directly attached device.
    • C、It is the next hop for a route from a qualified protocol.
    • D、It is an alternative next hop for a static route.

    正确答案:D

  • 第18题:

    单选题
    Which statement describes Reverse Route Injection (RRI)?()
    A

    A static route that points towards the Cisco Easy VPN server is created on the remote client.

    B

    A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.

    C

    A default route is injected into the route table of the remote client.

    D

    A default route is injected into the route table of the Cisco Easy VPN server.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?()
    A

    filter

    B

    forward

    C

    next-hop

    D

    next-interface


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement describes the purpose of BGP route damping?()
    A

    Avoid interface bandwidth saturation.

    B

    Drop BGP routes when the routing-table becomes full.

    C

    Remove unnecessary route attributes when not in use.

    D

    Limit the effects of a flaping interface on route removal and readvertisement.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()
    A

    Acquire locks on table queried 

    B

    Generate redo for statement 

    C

    Fetch data from disk into memory 

    D

    Write changes to disk


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
    A

     It is recommended to place the VPN termination device in line with the Enterprise Edge 1

    B

     Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment

    C

     VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

    D

     Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement best describes OSPF external LSAs (type 5)?()
    A

    OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.

    B

    External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.

    C

    Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.

    D

    External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement correctly describes IPsec VPN backup technology?()
    A

    The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocol

    B

    Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworks

    C

    Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP address

    D

    The cypto isakmp keepalive command is used to configure stateless failover


    正确答案: D
    解析: 暂无解析