Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-261_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261_V3.0 Exam Dumps - HCIE-Routing & Switching (Written) V3.0

Question # 4

In an MPLS BGP VPN network without the MPLS penultimate hop popping technology enabled, when a packet arrives at the last hop PE, the packet has two layers of labels, and the two layers of labels can be the same.

A.

TRUE

B.

FALSE

Full Access
Question # 5

In the topology shown in the figure, if the entire network runs OSPFv3 without importing external routes, what type of LSA will not be generated on R1?

A.

link-lsa

B.

Intra-Area-Prefix-LSA

C.

Inter-Area-Prefix-LSA

D.

Inter-Area-Router LSA

Full Access
Question # 6

In the campus network, what are the problems of manually creating static tunnels?

A.

Static tunnels also use related protocols on the control plane, which will cause equipment resource loss

B.

VTEP can only rely on data flooding to learn the remote MAC address

C.

Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the configuration workload is large and the configuration adjustment is complicated

D.

If N devices establish static VXLAN tunnels, at most N(N-1)/2 tunnels need to be manually configured, and the amount of configuration is large.

Full Access
Question # 7

The following are about 802.1x authentication. What are the correct statements about RADIUS authentication and HWTACACS authentication?

A.

Users can use 802.1x authentication to access the network, RADIUS completes authentication.

B.

RADIUS authentication and WTACACS authentication are mutually exclusive, and dual authentication cannot be performed for the same user at the same time.

C.

RADIUS authentication and HWTACACS authentication can perform dual authentication for the same user at the same time, which is more secure.

D.

RADIUS authentication and 802.1x authentication are mutually exclusive.

Full Access
Question # 8

About IGMP Proxy is correct? (multiple choice)

A.

IGMP PThe downstream interface of the roxy device generates multicast forwarding entries based on the information of member hosts joining/leaving the multicast group

B.

IGMP Proxy can work with NQA to detect link status and realize fast switching between active and standby links

C.

IGMP PProxy is usually deployed on the device between the member hosts of the access device

D.

IGMP PThe roxy device cannot replace the IGMP querier to send query packets to downstream member hosts to maintain group membership.Tie

Full Access
Question # 9

Which of the following functions will affect the establishment of BGP neighbors?

A.

ebgp max hop

B.

BGP certification

C.

BGP route filtering

D.

BGP GSTM

Full Access
Question # 10

Regarding the description of IGMP Snooping, is it correct?

A.

IGMP Snooping does not consume the CPU of the switch

B.

IGMP Snooping solves the problem of multicast multicast broadcast at Layer 3

C.

IGMP Snooping runs at the link layer and is a multicast constraint mechanism on a Layer 2 Ethernet switch to manage and control multicast groups.

D.

IGMP Snooping establishes a MAC multicast address table by monitoring the IGMP messages sent by the host.

Full Access
Question # 11

The two routers in a company are configured as follows. The following statements about the R1 routing table are correct:(single choice)

A.

only putR2 The ISIS protocol priority is adjusted to 5,Only the IP routing entry with the destination network segment 10.0.0.2/32 on R1 will be generated by OSPF

B.

if putR1 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.22/32 on R1 is generated by OSPF

C.

if putR1 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.2.2/32 on R1 is generated by ISIS

D.

if putR2 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.2.2/32 on R1 is generated by ISIS

Full Access
Question # 12

R3 andR1 IS-IS The neighbor is not established. According to the information in this picture, what is the possible reason? (single choice)

A.

R3 andR1 Systemm ID Repeat

B.

R3 and R1 have different area numbers

C.

R3 andR1 IS-Leve1 Do not match

D.

R3 andR1 IIH Authentication failed

Full Access
Question # 13

man-in-the-middle attack or IP/MAC SpoofingAttacks can lead to information leakage and other hazards, and are more common in intranets. To prevent man-in-the-middle attacks or IP/MAC SpoofingAttack, the configuration methods that can be taken are:

A.

turn onDHCP Snooping checkDHCP Function of the CHADDR field in the REQUEST message

B.

configureTrusted/Untrusted interface

C.

Configuration on the master switchDHCP Snooping withDAL or IPSG for linkage

D.

Limit the maximum number of learning allowed on a switch interfaceMACnumber of addresses

Full Access
Question # 14

When the source IAT is allocated and there is a no-pat allocation parameter, which of the following statements is correct?

A.

Perform source IP address and source port conversion at the same time

B.

Only perform source IP address translation

C.

Only perform destination IP address translation

D.

Convert destination IP address and destination port

Full Access
Question # 15

As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through SPF, and the same Domain ID is declared on both PE1 and PE2. When importing routes from BGP to OSPF on PE2, which of the following types of LSAs may be delivered to CE2?

A.

Type5 LSA

B.

Type7 LSA

C.

Type3 LSA

D.

Type1 LSA

Full Access
Question # 16

BGP EVPN Type2 Routing is used to pass IRB In the case of type routing, the information carried includes ?

A.

Layer 3 VNI

B.

Host MAC address

C.

Layer 2 VNI

D.

Host IP address

Full Access
Question # 17

Adjust IS-IS What is the command for the interface link cost value? (single choice)

A.

isis cost

B.

isis timer hello

C.

isis circuit-type

D.

isis circuit-leve1

Full Access
Question # 18

The DHCPv6 server supports providing the host with other configuration information such as the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 19

After the establishment of the RPT village, what is the wrong description about the SPT switching?

A.

The SPT path is the shortest and the forwarding performance is better

B.

The RPT tree may not be the optimal path for group insertion traffic forwarding

C.

All multicast traffic passes through the RP router, and the RP router may become the bottleneck of data forwarding

D.

After the SPT switching is completed, the multicast traffic still passes through the RPT tree

Full Access
Question # 20

As shown in the following figure, part of the LSPs in the LSDB of a router are shown in the first entry in the following figure. Now I have received a new LSP, the second one in the figure below, the following statements are wrong

A.

This router will put the newly received LSP in the LSDB

B.

If it is a broadcast network,The DIS will include the summary information of this LSP in the next CSNP packet.

C.

This router ignores LSPs received from neighbors

D.

If it is a point-to-point network, the router will send PSNP

Full Access
Question # 21

The switches SWA and SWB are connected through two Ethernet links, and the switch SWA has the following interface configurations:

A.

No need to change the current configuration, GigabitEthemnet1/0/1 and GigabitEthernet1/0/2 can join the same aggregation group

B.

Because of the VLA allowed to passN is different, GigabitEthemet1/0/1 Cannot join the same aggregation group as GigabitEthernet1/0/2

C.

After link aggregation is configured on both SWA and SWB, if the switches SWA and SWBopen Kai MSTP, then GigabitEthernet1/0/1 and GigabitEthernet1/0/2 are in the forwarding state of MSTP

D.

Only the GigabitEtheThe configuration of rmet1/0/2 is changed to be the same as that of GigabitEthemet1/0/1, so that the two can join the same aggregation group

Full Access
Question # 22

OSPFv3 Adopted with OSPFv2 The same route advertisement method, in OSPFv3 Area views are advertised through the network command.

A.

TRUE

B.

FALSE

Full Access
Question # 23

ThroughoutHWRun SSM on an IP multicast network. The following is correct about SSM understanding? (multiple choice)

A.

No RP required

B.

SSM only uses shared trees

C.

SSM uses STP tree only

D.

Best for1-to-many application

E.

SSM is recommended in networks with multiple sources and a desire to minimize in Use when the state of the route

F.

Best for many-to-many applications

Full Access
Question # 24

In order to allow routers at both ends of an IPv6 over IPv4 manual tunnel to exchange routing information, OSPFv3 can be enabled on the tunnel, OSPFv3 will be able to form a neighbor relationship normally, and the tunnel interface will be regarded as a P2P link interface.

A.

TRUE

B.

False

Full Access
Question # 25

Which of the following descriptions is incorrect about the BGP alliance?

A.

The confederation divides an AS into several sub-ASs, and the AS outside the confederation still considers the confederation as one AS.

B.

Sub-ASs within the confederation can use private AS numbers. HuaweiFor NE/AR routers, a confederation can be configured with up to 32 sub-ASs.

C.

A confederation can easily detect routing loops within an AS because EBGP is running between child ASs.

D.

Son of the UnionAS number, which is advertised to BGP peers outside the federation by default

Full Access
Question # 26

Which of the following descriptions about OSPFV3 packets is correct?

A.

The Option field of Hello and DD packets is extended to 24 bits

B.

The LSR packet contains the complete LSA header information and is used to request to update the LSA

C.

The LSACK message contains the LSA header information to confirm receipt of the LSU message

D.

The Hello packet must contain the interface ID of the sending interface

Full Access
Question # 27

In Huawei equipment, when ISIS imports external routes and sets the external route label of the routing information, the ISIS MetThe ric type does not need to be modified, keep silentAccept it. ( confirmed)

A.

True

B.

false

Full Access
Question # 28

Two VTEPs in a VXLAN can determine a VXLAN tunnel, and the VXLAN tunnel between the VTEPs will be shared by all VNIs between the two NVEs.

A.

True

B.

false

Full Access
Question # 29

Which of the following statements about the multicast address used by 0SPFv3 is correct? (Multiple choice)

A.

DR routers use FF08::6

B.

DR routers use FF02::6

C.

All OSPsF Router uses FFO2::5

D.

All OSPsF Router uses FF08:5

Full Access
Question # 30

Which type of address prefix in the following options indicates that the address is globally unique and globally routable among IPv6 unicast addresses, similar to the public address in IPv4?web address?

A.

::1/128

B.

FE80::/10

C.

C00::/7

D.

2000::/3

Full Access
Question # 31

Regarding the description of the security level of the firewall security zone, what is wrong?

A.

For a newly created security zone, the system defaults to its security level of 1

B.

In the same system, two security zones are not allowed to configure the same security level

C.

Only the security level can be set for a custom security zone

D.

Once the security level is set, it is not allowed to change

Full Access
Question # 32

If the network runs the OSPF protocol, configure the non-backbone area in the OSPF area as Totaly After the stub area, ABThe R router will send Totally An L is delivered to the stub areas Id 0.0.0.0 LSA, which type of LSA does this LSA belong to??

A.

LSA3

B.

LSA1

C.

LSA5

D.

LSA2

Full Access
Question # 33

General VPUsers in N can only communicate with each other, but cannot communicate with Internet users, nor can they access the Internet. However, each site of the VPN may need to access the Internet. Which is the correct description for the realization method of VPN and Internet interconnection?

A.

Implemented on the user side, directlyCEs are connected to the Internet. Each user site can be independently connected to the Internet, that is, the CE of each site is configured with a default route to the Internet.

B.

The implementation on PE is complicated and there are security risks. PE equipment may be affected by the Internet Dos attack.

C.

Implemented on the PE, the PE device is directed toThe CE sends a default route to the Internet and adds a default route to the Internet gateway in the VPN instance routing table.

D.

Implemented on the user side, the implementation method is simple, the public network and private network routes are isolated, and it is safe and reliable.

Full Access
Question # 34

The topology diagram and configuration are as follows. Now I hope that there is no detailed routing entry for 10.0.3.3/32 in the R1 routing table. The following statement can achieve this requirementhave

A.

existRoute summary is configured on R3, and the route is summarized as 10.0.0.0/16

B.

existRoute summary is configured on R2, and the route is summarized as 10.0.0.0/16

C.

existConfigure filter-policy on R1, match 10.0.3.3/32 through ACL, and apply it in the import direction at the same time

D.

existThe filter-policy is configured on R2, which matches 10.0.3.3/32 through ACL and applies it in the export direction at the same time

Full Access
Question # 35

oneroute-policy There can be multiple nodes, different node numbers use node Identifier, there can be multiple if-matches under each node and apply Clause, which of the following descriptions is false? (Multiple Choice)

A.

The relationship between different nodes is "or"

B.

The relationship between different nodes is "and"

C.

if-match under each node There is an "and" relationship between clauses

D.

if-match under each node "or" relationship between clauses

Full Access
Question # 36

As shown in the figure, R1, R2 and R3 run OSPP at the same time and announce their respective loopback ports. The following description is wrong.

A.

filter-policy can be used on R2 expoThe rt command filters the loopback route of R3

B.

R2 can be used in Area use filter in 0r import command to filter the loopback route of R3

C.

filter-policy can be used on R1 import filters the loopback route of R3

D.

Area is available on R2 Use filter in 1r expot command to filterR3 loopback route

Full Access
Question # 37

The data result of a router is as shown in the figure below. According to this analysis, the correct conclusion is:

A.

R3's GE0/0/0 port and its neighbor are in different areas

B.

Eth0/0/1 of the R3 router enables both IPv4 and IPv6 ISIS

C.

R3 is Level-1 and L on the link where Eth0/0/0 is located evel-2 DIS

D.

The circuit-level of Eth0/0/1 of the R3 router is Level-1-2

Full Access
Question # 38

Two routers running IS-IS can establish adjacency only if the time interval between IIH sending is the same.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Which of the following statements is false about TCP's sliding window? (Multiple Choice)

A.

The sender announces the initial window size

B.

The sender does not need to transmit the full window size of the message

C.

TCPSliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer expires, the sender has not received the acknowledgment and will retransmit the unacknowledged data

E.

The receiver needs to confirm the data packet of the sender

F.

Sliding window size can only increase or stay the same

Full Access
Question # 40

The MAC address table of the switch with default configuration is empty at this time, and the host A connected to the switch sends the first unicast data frame, then what operation will the switch perform after receiving the instruction?

A.

The switch will drop the frame

B.

The switch will record the source MAC address of the data frame and flood the data frame

C.

The switch will forward the data out an interface according to the destination MAC address of the data frame

D.

The switch will buffer the data frame and forward it after waiting for the destination host to send the data frame

Full Access
Question # 41

The association between LDP and IGP means that IGP suppresses the advertisement of reachable routes to ensure that LDP and IGP cooperate to complete network convergence, so that IGP and LDP maintain the same path, minimize traffic loss, and improve the reliability of the entire network.

A.

True

B.

false

Full Access
Question # 42

an engineer uses 2 router for IPv46 business test, by running BGP4+Simulate the interconnection between headquarters and branches. The network logical topology is shown in the figure, about the IPv6 between the two devices Route delivery, which of the following statements is false?

A.

When routing is passed, Next_ Hop Attribute must be IPv46 Global Unicast Address

B.

When routing, it will carry AS. _Path and other recognized mandatory attributes

C.

likeUpdate NP is carried in the packet. REACHL NLRI Attribute, indicating that reachable routes are advertised

D.

BGP4+ passUpdate Packets transmit routing information between peers

Full Access
Question # 43

Which of the following statements about stacked MAD detection is wrong?

A.

MAD direct connection detection can be done through an intermediate device or full-mgsh.

B.

MAD detection methods are divided into direct connection detection and proxy detection.

C.

MAD proxy detection requires that all stack members are connected to the proxy, and the connected links are added to an Eth-Trunk.

D.

When the stacking systems act as agents for each other to perform MAD detection, the two stacking systems can use the same Domain ID

Full Access
Question # 44

If the advertised route entry is deleted on the BGP router, the BGP router will be triggered to send an Update message for route revocation. Well-known mandatory attribute with revoked routing entries.

A.

True

B.

false

Full Access
Question # 45

What command can be used to prevent users from accessing multiple devices through the HUB on the access port of the switch? (Single Choice)

A.

[Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1]port link type trunk

[Huawei-GigabitEthernet0/0/1port trunk allow pass vlan 10

[Huaweijinterface GigabitEthernet 0/0/1

B.

[Huawei-GigabitEthernet0/0/1]port link type access [Huawei GigabitEthernet0/0/1]ipsg enable

. [Huawei]interface GigabitEthernet 0/0/1

C.

[Huawei-GigabitEthernet0/0l]port link-type access [Huawei-GigabitEthernet0/0/1 ]port-security enable

[Huawei]interface GigabitEthernet 0/0/1

D.

[Huawei-GigabitEthernet0/0/1 ]port link type access [Huawei-GigabitEthernet0/0/1]port isolate enable

Full Access
Question # 46

The two routers are connected together through serial ports, but they cannot ping each other. Now check the port status as follows:

Can you determine the cause from the above information?

A.

Insufficient link bandwidth

B.

Subnet mask mismatch

C.

Inconsistent link layer protocols at both ends

D.

The IP addresses of both ends are not on the same network segment

Full Access
Question # 47

The OSPFv3 protocol is a separately developed protocol. It is somewhat different from OSPFv2. Regarding OSPFv3 is based on links rather than network segments, which of the following statements is wrong?

A.

For two OSPs connected to the link F routers, even if their IPv6 address prefixes are different, can still establish neighbor relationships

B.

OSP the routing information obtained by Fv3 routers from neighbors will use the neighbor's Link-Local address as the next hop for forwarding packets.

C.

For two OSPs connected to the link F routers can establish neighbor relationships even without configuring a unicast IPv6 address

D.

All OSPs except virtual connections All Fv3 interfaces use the Link-Local address as the destination address of the packet

Full Access
Question # 48

IPSG can statically configure the binding table, orDHCP-Snooping is used together to form a binding table

A.

True

B.

false

Full Access
Question # 49

The multicast IP address is 239.130.130.1, the corresponding MAC address is:

A.

01-00-5E-02-82-01

B.

01-00-5E-82-82-01

C.

00-00-5E-02-82-01

D.

00-00 -5E-82-82-01

Full Access
Question # 50

Which of the following regular expressions can match only the BGP routing entries that pass through AS200 and then through AS300?

A.

_[200 300]_

B.

200$|300$

C.

^200|^300

D.

_(200 300)_

Full Access
Question # 51

OSPIn Fv3, the Router-LSA is generated for each router, which describes the interface address and cost of each link of the router, and also includes the RouterID of the neighboring router.

A.

True

B.

false

Full Access
Question # 52

Which of the following parameters is not a configuration BGP PeeA must for r?

A.

description

B.

as-number

C.

peer's IP Address

D.

password

Full Access
Question # 53

Which of the following descriptions is wrong about the address resolution function of NDP?

A.

When sending a neighbor solicitation packet, the source address must be the link-local address of the end interface

B.

When sending a Neighbor Solicitation message, the destination address must be the neighbor's requested node multicast address. C. Two ICMPv6 messages, Neighbor Solicitation and Neighbor Advertisement, are used in the address resolution process.

C.

Address resolution realizes the function of resolving from IPv6 address to link layer address

Full Access
Question # 54

A campus has deployed IPv6 for business testing. In the early stage of deployment, engineers wanted to achieve network interoperability through IPv6 static routing. When creating an IPv6 static route, you can specify both the outbound interface and the next hop, or only the outbound interface or only the next hop.

A.

TRUE

B.

FALSE

Full Access
Question # 55

N NO: 200

You want to set the DSCP value for VoIP traffic in the HW network device to EF. According to the Differentiated Services Model RFC, the traffic marking EF should be set to:

A.

DSCP set to decimal 36

B.

IP ToS is set to 0xEF

C.

IP Experimental EEN

D.

DSCP set to decimal 5

E.

bitstream 101110

Full Access
Question # 56

OSPFv2 is running over IPv4 Network IGP: OSPFv3 is running over IPv6 Network IGP: OSP the packet types of Fv3 and OSPFv2 are the same, incl. He11o message, DD message, LSR message, LSU message

and LSAck packets. Which of the following statements is true about 0SPFv3 packets?

A.

OSPFv3 ofHello The packet carries the IPv4 address of the router interface6 Address prefix list

B.

OSPFv3 uses the authentication field in the packet header to complete packet authentication

C.

OSPFv3 uses the link-local address as the source address of the sent packet, and the packet can be forwarded outside the range of the originating link

D.

OSPFv3 Use IPv46 multicast addressFF02: :5 andFF02: :6 send OSPFv3 message

Full Access
Question # 57

Which of the following categories can ACL be divided into?

A.

Basic ACL

B.

Layer 2 ACL

C.

Advanced ACL

D.

User-defined ACL

Full Access
Question # 58

Which of the following statements about LDP reliability is incorrect?

A.

LDP GR (Graceful Restart) utilizes the feature that the forwarding plane and the control plane of the LS are high, and realizes the switchover of the device during protocol restart or active/standby switchover.uninterrupted

B.

By default, the manually configured LDP FRR policy is a 32-bit backup route that triggers LDP to establish a backup LSP.

C.

by LDP FRR can also generate LSPs for label mappings from non-optimal next hops, and create forwarding entries as backups of the primary LSPs

D.

LDP and IGP are associated with each other, and the IGP needs to suppress the advertisement of routes to ensure that the LDP and LGP paths are consistent.

Full Access
Question # 59

The correct description about the prefix list is: (multiple choice)

A.

Prefix list is used to filter IPPrefix, which can match both prefix number and prefix length

B.

Prefix list is used to filter IPPrefix, cannot match prefix number and prefix length at the same time

C.

Prefix lists cannot be used for packet filtering

D.

Prefix lists can be used for packet filtering

Full Access
Question # 60

There is no routing protocol running on the router HW and only a default route is used to reach the remote network. Use the extension to ping the remote file server address 10.5.40.1 on the router. The result of pinging on the router is presented as "Request time out". According to the above description, the following analysis is wrong

Yes?

A.

The next-hop router of router HW has no path to reach the destination address

B.

Ping was successful, but congestion occurred on the path to the destination

C.

ICMP packets can reach the destination address, but the destination device fails to reply

D.

router HWThere is no valid route to the destination address

E.

There is a firewall in the remote destination network, and I have not been releasedCMP traffic

Full Access
Question # 61

OSPFv2 is running over IPv4 Network IGP: OSPFv3 is running over IPv6 Network IGP. OSPFv3 and Compared with 0SPFv2, it has similar LSA types, but with slightly different functions. Which of the following is not included in the OSPFv3 LSA type?

A.

Router-LSA

B.

Network-LSA

C.

ASBR- Summary-LSA

D.

AS-External -LSA

Full Access
Question # 62

The advanced access control list is a series of ordered rules composed of permit I deny statements. These rules can match IP packets according to which of the following attributes?

A.

source address

B.

destination port number

C.

source port number

D.

destination address

Full Access
Question # 63

in MPLS-In the case of IBGP-VPN, if only BGP and LDP are used to distribute labels, the MPLS labels of packets can be up to two layers of labels.

A.

True

B.

false

Full Access
Question # 64

Assuming that the shaping rate of a port is 100Mbps, the input bandwidth of each service on the interface and the PIR of the IP configuration are as follows: After the first round of scheduling, what is the bandwidth allocated by the EF queue?

A.

30M

B.

15M

C.

90M

D.

25M

Full Access
Question # 65

What is wrong about the description of the permanent multicast address?

A.

All running OSPF Protocol routers are listening 224.0.0.5

B.

All routers are listening 224.0.0.2

C.

All running PIM Protocol routers are listening 224.0.0.100

D.

All hosts and routers in the network segment are listening 224.0.0.1

Full Access
Question # 66

command ip as path-filterr 1 permit ^12.*74$ can match which AS_ PATH?

A.

AS_ _PATH (321 12 2374)

B.

AS_ _PATH (123621 7432374)

C.

AS_ PATH (125328 74 twenty three)

D.

AS_ PATH (32 1274 twenty three)

Full Access
Question # 67

What are the three modes of sending IPv4 packets? A. Unicast

B. Broadcast

C. Multicast

D. Anycast

Full Access
Question # 68

When configuring AS-Path-Filter, ipas-path-filter10 permit _100$ means matching the route received from AS100 but not originated from AS100

A.

TRUE

B.

FALSE

Full Access
Question # 69

About MP-BGP, which of the following descriptions is wrong? (single choice)

A.

MP-EGP by MP_REACH_NLRI and IP_UNREACH_NLRI Two attributes to advertise VPNv4 routing

B.

MP-BGP The required message is quasi-VP type N, v4VP route N is distributed by v4 distribution and privately issued network label policy label slightly with BGP-4 same

C.

When the PE and CE exchange routes through BGP, a BGP process needs to be created on the CE for each VPN instance

Full Access
Question # 70

What type of prefixes a router running BGP will advertise to its IBGP neighbors (assuming the router is not configured as a route reflector) ?

A.

The prefix is learned through other IBGP neighbors, or the prefix is learned from EBGP neighbors, or the prefix is learned through route importarrived

B.

Prefixes that exist in the routing table

C.

The prefix is learned through other BGP neighbors, or the prefix is locally through network or route introduction learned

D.

The prefix is learned via EBGP neighbors, or the prefix is locally via network or route introduction learned

E.

The prefix is learned from EBGP neighbors, or the prefix is learned from RR

Full Access