A.The command will initiate a probe with a destination IP address of 10.1.1.1
B.The command is used on the IP SLA responder and the IP SLA source
C.The command will allow only source address 10.1.1.1 to source probes
D.The command will initiate a probe with a destination Telnet port
E.The command is used to make the router a responder
F.The command will initiate a probe with a source port of 23
您可能感興趣的試卷
你可能感興趣的試題
A.Use the Cisco Auto Configuration tool
B.Use the Cisco Rollback feature
C.Automate documentation
D.Schedule documentation checks
E.Use the Cisco Configuration Archive tool
F.Require documentation prior to a ticket being closed out
A.DHCPREQUEST, DHCPOFFER, DHCPDISCOVER, DHCPACK
B.DHCPDISCOVER, DHCPOFER, DHCPREQUEST, DHCPACK
C.DHCPOFFER, DHCPACK, DHCPREQUEST, DHCPDISCOVER
D.DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK
E.DHCPREQUE5T, DHCPDISCOVER, DHCPOFFER, DHCPACK
F.DHCPDISCOVER, DHCPACK, DHCPREQUEST, DHCPOFFER
A.Ensuring compliance with legal regulations and corporate policies
B.Troubleshooting problem reports
C.Planning for network expansion
D.Providing support to sales and marketing
E.Giving presentations to management
F.Monitoring and tuning network performance
A.Unknown destination MAC address
B.Bad cabling
C.MAC forwarding table is full
D.Port configured for half duplex
E.Port configured for full duplex
F.Network congestion
A.ff02:a:b:c::l/64
B.2001:aaaa: 1234:456c: 1/64
C.2001:000a:lb2c::/64
D.2fff:f:f:f::f/64
E.ff02:33ab:l:32::2/128
F.2001:bad:2345:a:b::cef/128
A.EIGRP database table
B.EIGRP CEF table
C.EIGRP neighbor table
D.EIGRP adjacency table
E.EIGRP interface table
F.EIGRP topology table
A.Bottom up
B.Component swapping
C.Top down
D.Shoot from the hip
E.Divide and conquer
F.Follow the traffic path
A.OSPF LSA type 5 triggers an LSA type 7 at an ABR between an NSSA and the backbone area
B.OSPF LSA type 1 triggers an LSA type 3 at an ABR.
C.OSPF LSA type 7 triggers an LSA type 5 at an ABR between an NSSA and the backbone area
D.OSPF LSA type 3 triggers an LSA type 4 at an ABR.
E.OSPF LSA type 5 triggers an LSA type 7 at an A5BR but only in N5SAs
F.OSFP LSA type 2 triggers an LSA type 3 at an ABR
A.The TCAM has reached capacity
B.An unknown destination MAC address
C.A packet being discarded due to a security violation
D.A Telnet packet from a session being initiated with the switch
E.Routing protocols sending broadcast traffic
F.A packet belonging to a GRE tunnel
A.The new router will become active immediately because it’s the newest router introduced intothe group
B.The new router can become active only when the existing active router and the existing standbyrouter become unavailable
C.The new router has a lower priority value
D.The new router will never become active unless the existing active router becomes unavailable
E.The new router has preempt configured and a higher priority
F.The new router has a higher priority value
最新試題
Which statement correctly describes IPsec VPN backup technology?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
Refer to the exhibit. Which two statements about the AAA configuration are true?()
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()