A. route preference B. routing loop C. invalid next hop D. routing policy
多项选择题Which two login-class permissions could permit a user to view the system hierarchy of the active configuration?()
A. system permission B. view-configuration permission C. network permission D. super-user permission
单项选择题Which statement is true regarding the Junos OS?()
A. The Junos kernel is based on the Solaris operating system B. The Junos kernel is based on the GNU Zebra operating system C. The Junos kernel is completely original and not based on any other operating system D. The Junos kernel is based on the FreeBSD UNIX operating system
单项选择题Which command displays the amount of space available on the storage media?()
A. show chassis routing-engine B. show system file-storage C. file list D. show system storage
多项选择题You have been asked to establish reachability between Router 1s and Router 2s loopback addresses as shown in the exhibit.Which two steps will accomplish this task?()
A. Create a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.2 B. Create a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.1 C. Create a static route on Router 2 to 172.17.25.1 with a next hop of 10.10.10.1 D. Create a static route on Router 1 to 172.17.25.1 with a next hop of 10.10.10.2
单项选择题What is the purpose of a network mask?()
A. It is used to identify the maximum hop count of a subnetwork B. It is used to identify an IP address as either private or public C. It is used to identify the network to which an IP address belongs D. It is used to identify the total number of bits present in an IP address