TwoislandsofIPv6networksthatarerunningISIS(IPv6IGP)mustbeconnectedusingatunneloveranIPv4network.Whichtunnelingmethodcanbeusedtoachievethisgoal?()
A.GREtunnels
B.automatic6to4tunnels
C.ISATAPtunnels
D.manualtunnels(RFC2893)
A.GREtunnels
B.automatic6to4tunnels
C.ISATAPtunnels
D.manualtunnels(RFC2893)
第1题
A.enablingmodularQoSoverFrameRelay
B.enablingReal-TimeTransportProtocol(RTP)headercompression
C.enablingdistributedcompressedTransmissionControlProtocol
D.enablinglatencyandjitterreductionforTransmissionControltraffic
E.enablingTCPheadercompression
第2题
A.TheMDTgroupaddressshouldbethesameforbothaddressfamiliesinthesameVRF
B.TheMDTgroupaddressshouldbethesameforbothaddressfamiliesinthedifferentVRFs
C.ConfigurationoftheMDTsourceonapre-VRFbasisissupportedonlyonIPv6
D.TheMDTgroupaddressshouldbedifferentforbothaddressfamiliesinthesameVRF
第3题
A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco
B. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password cisco
C. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password cisco
D. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password cisco
E. ACCESS1(config)# enable password cisco
F. Remote27(config)# enable password cisco
第4题
A.Providersupportforintra-ASandCSCscenarios
B.Usesseparatesignalingplane,whichprovidesmoresecuritythanIPv4
C.BGPisthepreferredroutingprotocolforconnectingtwoSPs
D.Norequirementforaseparatesignalingplane
第5题
A. The new IOS image is too large for the router flash memory.
B. The TFTP server is unreachable from the router.
C. The new IOS image is not correct for this router platform.
D. The IOS image on the TFTP server is corrupt.
E. There is not enough disk space on the TFTP server for the IOS image.
第6题
A.1
B.None
C.3
D.2
E.ItdependsonthenumbersofhopsbetweentheingressandegressPE
第7题
A. enbale password c1sco
B. secret enable c1sco
C. password enable c1sco
D. enable secret c1sco
第9题
A. after broken links are re-established
B. in an improperly implemented redundant topology
C. when upper-layer protocols require high reliability
D. during high traffic periods
E. when a dual ring topology is in use
第10题
A.thetwomethodsofauthenticationusingtheWEPencryptionareopenandsharedkey
B.the802.11standarddefinesWEPsecurityusing128-bitkeys
C.WEPcanprovidestrongerauthenticationthroughtheuseofLEAP,PEAP,orEAP-FAST
D.WEPisascalableencryptionsolutionthatusesstatickeysforauthentication
E.WEPsecurityprovidesonlyone-wayauthentication
F.WEPv2offersimprovedencryptionbyreplacingtheRC4encryptionmechanismwiththeAES(symmetricblockcipher)mechanism
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!