A. Legacy DDR can use port information to define interesting traffic.
B. Legacy DDR can configure multiple dialer configurations on the same interface.
C. Legacy DDR can use ACLs to define interesting traffic.
D. HDLC or PPP can be used to encapsulate ISDN D channel information.
E. The BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.
F. Dialer profiles cannot use extended ACLs to define interesting traffic.
您可能感興趣的試卷
你可能感興趣的試題
A. 16kb/s
B. 64kb/s
C. 128kb/s
D. 144kb/s
E. 192kb/s
F. 256kb/s
A. PPP and ATM
B. PPP and SDLC
C. ATM and HDLC
D. SDLC and HDLC
A. X25
B. Frame Relay
C. ATM
D. ISDN
E. ATX
F. None of the above
A. TK1(config-if)# encapsulation hdlc ansi
B. TK1(config-if)# encapsulation ppp
C. TK1(config-if)# encapsulation LAPD
D. TK1(config-if)# encapsulation frame-relay ietf
E. TK1(config)#encapsulation ppp
A. HDLC
B. NCP
C. PAP
D. LAPD
E. LAPB
F. None of the above
最新試題
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
Which of the following describe router functions?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which characteristics are representative of a link-state routing protocol?()
What does a configuration Register Setting of 0x2105 indicate to the Router? ()