多項選擇題Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()

A.Routing loops
B.Misconfiguration of VPN end points
C.Overiapping IP address space
D.DMVPN
E.User profiles
F.MTU


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Which of the following is a valid representation of the following IPv6 address:
2001:0000:0000:0abc:0000:0000:000a:000b? Choose the answer with the least number of digits.()

A.2001:0000:0:abc:0000:0000:a:b
B.2001::abc::a:b
C.2001::abc:0:0:000a:000b
D.2001::0abc:0000:0000:a:b
E.2001:0000:0000:abc::a:b
F.2001::abc:0:0:a:b

2.單項選擇題Which of the following is not a typical wireless troubleshooting target?()

A.Quality of Service
B.Trunk configuration
C.Access lists
D.Routing protocol configuration
E.Power over Ethernet
F.DHCP configuration

3.單項選擇題Which of the following solutions will encapsulate IPv6 packets with IPv4 headers?()

A.Create an IPv4 tunnel and assign the tunnel IPv6 addresses
B.Create IPv4 interfaces on both ends of the network, and use either static routes or a routingprocess to direct IPv6 packets through those interfaces
C.IPv6 packets cannot be encapsulated with IPv4 headers because the addresses are notcompatible
D.Create IFV6 interfaces on both ends of the network, and use static routes to point the IPv4address to those interfaces
E.Use an IPv6 routing protocol like OSPFv3 and assign IPv4 packets to that process
F.Create an IPv4 tunnel and use the tunnel mode ipv6ip command

4.單項選擇題Which of the following commands will enable you to see the contents of the IP routing table andsend the output to a TFTP server at the same time?()

A.show ip route ∣ to tftp://192.168.1.1/route.txt
B.show ip route ∣ tee tftp://192.168.1.1/route.txt
C.show ip route ∣ include tftp://192.168.1.1/route.txt
D.show ip route ft include tJtp://19Z168.1.1/route.txt
E.show ip route ∣ redirect tftp://192.168.1.1/route.txt

5.多項選擇題Which of the following characteristics are common to both RIPv2 and RIPng?(Choose all thatapply.)()

A.Link-local address used for next-hop addresses
B.Interface can be added to RIP routing process in either interface configuration mode or in routerconfiguration mode
C.Uses a multicast to send routing updates
D.Use hop count as a metric
E.Distance-vector routing protocol
F.Maximum hop count is 15 with 16 being "unreachable"

6.多項選擇題Which of the following is a valid method for defining a seed metric?(Choose all that apply.)()

A.The default-metric command configured under the appropriate interface
B.The metric parameter in the network command of a routing process
C.The metric parameter in the redistribute command
D.The default-metric command
E.A route-map containing a seed command
F.A route map containing a metric command

7.多項選擇題Which of the following three port types are valid Spanning Tree port types?(Choose the best threeanswers.)()

A.Designated port
B.Nonswitch port
C.Switch port
D.Nonroot port
E.Nondesignated port
F.Root port

8.單項選擇題Which of the following commands shows all routes learned via EIGRP?(Choose all that apply.)()

A.show ip eigrp topology
B.show ip eigrp adjacency
C.show ip eigrp routes
D.show ip eigrp database
E.show ip route eigrp
F.show ip eigrp forwarding

9.單項選擇題The 0SPFv3 process will send hello packets to which of the follov/ing well-known addresses?()

A.255.255.255.255
B.224.0.0.6
C.FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF:FFF
D.FF02::10
E.224.0.0.10
F.FF02::5

10.單項選擇題Which of the following commands will cause RIPng to originate a default route advertisement whilesuppressing all other routes?()

A.Rl(config-if)#ipv6 default-information originate
B.Rl(config-router)#ipv6 rip 〈process-name〉 default-information only
C.Rl(config)#ipv6 route ::/0 null 0
D.Rl(config-if)#ipv6 rip 〈process-name〉 default-information only
E.Rl(config-router)#ipv6 rip route ;:/0 originate
F.Rl(config-router)#aggregate-address ::/0 summarize-routes

最新試題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

cisco ios command to interface dialer 0

題型:問答題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:單項選擇題