A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
您可能感興趣的試卷
你可能感興趣的試題
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
A. 4to6 routing
B. 6to4 routing
C. binary routing
D. dual-stack routing
E. NextGen routing
A. to provide routing to a local web server
B. to provide routing from an ISP to a stub network
C. to provide routing that will override the configured dynamic routing protocol
D. to provide routing to a destination that is not specified in the routing table and which is outside the local network
A. the OSPF route
B. the EIGRP route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
A. Lower the bridge priority number.
B. Change the MAC address of the switch.
C. Increase the VTP revision number for the domain.
D. Lower the root path cost on the switch ports.
E. Assign the switch an IP address with the lowest value.
A. show ip interface [interface] access-lists
B. show ip access-lists interface [interface]
C. show ip interface [interface]
D. show ip access-lists [interface]
A. The incorrect channel is configured on the client.
B. The client's IP address is on the wrong subnet.
C. The client has an incorrect pre-shared key.
D. The SSID is configured incorrectly on the client.
A. All TCP traffic is marked discard eligible.
B. All UDP traffic is marked discard eligible and a BECN is sent.
C. All TCP traffic is marked discard eligible and a BECN is sent.
D. All traffic exceeding the CIR is marked discard eligible.
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
最新試題
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which statement describes the rule of split horizon?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
Which command is used to display the collection of OSPF link states?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
At which layer of the OSI model dose PPP perform?()