Which two table types are CEF components?()

题目
多选题
Which two table types are CEF components?()
A

forwarding information base

B

adjacency tables

C

neighbor tables

D

caching tables

E

route tables

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two types of attacks are considered to be denial of service?() (Choose two.)

A. zombie agents

B. SYN flood

C. IP packet fragments

D. WinNuke


参考答案:B, D

第2题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第3题:

Which of the following statements about ORACLE is (are) correct?

Ⅰ.ORACLE follows SQL standard

Ⅱ.ORACLE database defines two logical types: table and view

A.Ⅰonly

B.Ⅱ only

C.Ⅰ and Ⅱ

D.none of the above


正确答案:C

第4题:

Cisco Catalyst 4500 Series switches are attractive to medium-size campuses with growth opportunities due to the switches enhanced security and which two other features? ()

  • A、 enhanced multilayer software image
  • B、 connectivity to multiple types of WAN connections
  • C、 Cisco Unified Communications Manager
  • D、 QoS for converged networks
  • E、 modular, customizable components

正确答案:D,E

第5题:

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

  • A、Shared
  • B、Point-to-Point
  • C、Designated
  • D、Multiaccess non-broadcast

正确答案:A,B

第6题:

An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.)

A.path

B.resv

C.session

D.keepalive


参考答案:A, B

第7题:

Your boss, Miss ,is interested in CEF.  What should you tell her? ()

  • A、The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
  • B、The adjacent table is derived from the ARP table.
  • C、The FIB table is derived from the IP routing table.
  • D、When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
  • E、CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
  • F、When the CEF TCAM table is full, packets are dropped.

正确答案:B,C,D

第8题:

Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:Which two statements are true about redefining the table?()

A. All the triggers for the table are disabled without changing any of the column names or column types in the table.

B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.

C. VPD policies are copied from the original table to the new table during online redefinition.

D. You must copy the VPD policies manually from the original table to the new table during online redefinition.


参考答案:B, C

第9题:

Which two table types are CEF components?()

  • A、forwarding information base
  • B、adjacency tables
  • C、neighbor tables
  • D、caching tables
  • E、route tables

正确答案:A,B

第10题:

Which of the following are not BGRP data structures? (Choose all that apply.)()

  • A、EIGRP database table
  • B、EIGRP CEF table
  • C、EIGRP neighbor table
  • D、EIGRP adjacency table
  • E、EIGRP interface table
  • F、EIGRP topology table

正确答案:A,B,D

更多相关问题