單項(xiàng)選擇題Which of the following is not a typical wireless troubleshooting target?()

A.Quality of Service
B.Trunk configuration
C.Access lists
D.Routing protocol configuration
E.Power over Ethernet
F.DHCP configuration


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which of the following solutions will encapsulate IPv6 packets with IPv4 headers?()

A.Create an IPv4 tunnel and assign the tunnel IPv6 addresses
B.Create IPv4 interfaces on both ends of the network, and use either static routes or a routingprocess to direct IPv6 packets through those interfaces
C.IPv6 packets cannot be encapsulated with IPv4 headers because the addresses are notcompatible
D.Create IFV6 interfaces on both ends of the network, and use static routes to point the IPv4address to those interfaces
E.Use an IPv6 routing protocol like OSPFv3 and assign IPv4 packets to that process
F.Create an IPv4 tunnel and use the tunnel mode ipv6ip command

2.單項(xiàng)選擇題Which of the following commands will enable you to see the contents of the IP routing table andsend the output to a TFTP server at the same time?()

A.show ip route ∣ to tftp://192.168.1.1/route.txt
B.show ip route ∣ tee tftp://192.168.1.1/route.txt
C.show ip route ∣ include tftp://192.168.1.1/route.txt
D.show ip route ft include tJtp://19Z168.1.1/route.txt
E.show ip route ∣ redirect tftp://192.168.1.1/route.txt

3.多項(xiàng)選擇題Which of the following characteristics are common to both RIPv2 and RIPng?(Choose all thatapply.)()

A.Link-local address used for next-hop addresses
B.Interface can be added to RIP routing process in either interface configuration mode or in routerconfiguration mode
C.Uses a multicast to send routing updates
D.Use hop count as a metric
E.Distance-vector routing protocol
F.Maximum hop count is 15 with 16 being "unreachable"

4.多項(xiàng)選擇題Which of the following is a valid method for defining a seed metric?(Choose all that apply.)()

A.The default-metric command configured under the appropriate interface
B.The metric parameter in the network command of a routing process
C.The metric parameter in the redistribute command
D.The default-metric command
E.A route-map containing a seed command
F.A route map containing a metric command

5.多項(xiàng)選擇題Which of the following three port types are valid Spanning Tree port types?(Choose the best threeanswers.)()

A.Designated port
B.Nonswitch port
C.Switch port
D.Nonroot port
E.Nondesignated port
F.Root port

最新試題

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項(xiàng)選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:?jiǎn)柎痤}

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:?jiǎn)柎痤}

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:?jiǎn)雾?xiàng)選擇題

Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()

題型:多項(xiàng)選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:?jiǎn)雾?xiàng)選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題