Click the Exhibit button.
In the exhibit, R1 learns prefix 137.10/16 from BGP. In addition, you configured a static route in R1 and injected it into OSPF. R1 and R2 are OSPF and BGP peers.
By default, which protocol would R2 prefer when forwarding a packet to the destination
137.10/16?

A. OSPF
B. static route
C. load balance between OSPF and BGP
D. BGP
正解:A
質問 2:
Interface ge-0/0/0.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.19/24. A host with IP address 10.20.20.1 is running an SSH service on TCP port 2222. This host is attached to the ge-0/0/3.0 interface of your router. You must use interface-based static NAT to make the SSH service on the host reachable from the Internet.
On which IP address and TCP port can Internet hosts reach the SSH service?
A. IP address 10.20.20.1 and TCP port 2222
B. IP address 71.33.251.1 and TCP port 22
C. IP address 71.33.252.19 and TCP port 22
D. IP address 71.33.252.20 and TCP port 2222
正解:D
質問 3:
Regarding a route-based versus policy-based IPSec VPN, which statement is true?
A. A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
B. A route-based VPN is better suited for dialup or remote access VPNs compared to a policy-based VPN.
C. A route-based VPN uses a policy referencing the IPSec VPN; a policy-based VPN policy does not use a policy referencing the IPSec VPN.
D. A route-based VPN generally uses less resources than a policy-based VPN.
正解:D
質問 4:
What are two uses of NAT? (Choose two.)
A. allowing networks with overlapping private address space to communicate
B. preventing unauthorized connections from outside the network
C. allowing stateful packet inspection
D. conserving public IP addresses
正解:A,D
質問 5:
Which two statements about the Diffie-Hellman (DH) key exchange process are correct?
(Choose two.)
A. In the DH key exchange process, the private key values are exchanged across the network.
B. In the DH key exchange process, each router creates a unique public and private keys that are mathematically related by the DH algorithm.
C. In the DH key exchange process, each router creates a common public and a unique private key that are mathematically related by the DH algorithm.
D. In the DH key exchange process, the public key values are exchanged across the network.
正解:B,D
市川** -
JN0-330自学者向けの教科書だと思います。Pass4Testさん本当にありがとうございます。