A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password
您可能感興趣的試卷
你可能感興趣的試題
A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF
A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer
A.RIP version 1 broadcasts updates whereas RIP version 2 uses multicasts.
B.RIP version 1 multicasts updates while RIP version 2 uses broadcasts.
C.Both RIP version 1 and RIP version 2 are classless routing protocols.
D.RIP Version 2 is a classless routing protocol whereas RIP version 1 is a classful routing protocol.
E.Both RIP version 1 and version 2 support authentication.
F.RIP version 2 sends the subnet mask in updates and RIP version 1 does not.
A.no VLANs
B.all VLANs
C.only VLANs 1 - 64
D.only the VLANs that are specified when creating the trunk
A.It creates a VLAN 999 interface.
B.It designates VLAN 999 for untagged traffic.
C.It blocks VLAN 999 traffic from passing on the trunk.
D.It designates VLAN 999 as the default for all unknown tagged traffic.
A.It checks the configuration register.
B.It attempts to boot from a TFTP server.
C.It loads the first image file in flash memory.
D.It inspects the configuration file in NVRAM for boot instructions.
A.packet switching
B.access layer security
C.path selection
D.VLAN membership assignment
E.bridging between LAN segments
F.microsegmentation of broadcast domains
A.session
B.transport
C.network
D.data link
E.physical
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
最新試題
What is the purpose of the cisco Vlan Trunking protocol?()
On which options are standard access list based?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which IPsec security protocol should be used when confidentiality is required?()
How are VTP advertisements delivered to switches across the network?()
Which statement is true, as relates to classful or classless routing?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()