单项选择题The enable secret command is used to secure access to which CLI mode?()

A.user EXEC mode
B.global configuration mode
C.privileged EXEC mode
D.auxiliary setup mode


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which commands are required to properly configure a router to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?()

A.Router(config)#router ospf 1
B.Router(config)#router ospf 0
C.Router(config)#router ospf area 0
D.Router(config-router)#network 192.168.16.0 0.0.0.255 area 0
E.Router(config-router)#network 192.168.16.0 0.0.0.255 0
F.Router(config-router)#network 192.168.16.0 255.255.255.0 area 0

2.单项选择题

Refer to the exhibit.S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-and-spoke Frame Relay topology. While testing this configuration, a technician notes that pings are successfully from hosts on the 172.16.1.0/24 network to hosts on both the 172.16.2.0/25 and 172.16.0.2.128/25 networks. However, pings between hosts on the 172.16.2.0/25 and 172.16.2.128/25 network are not successful. What could explain this connectivity problem?()

A.The ip subnet-zero command has been issued on the R1 router.
B.The RIPv2 dynamic routing protocol cannot be used across a Frame Relay network.
C.Split horizon is preventing R2 from learning about the R3 networks and R3 from learning about R2 networks.
D.The 172.16.2.0/25 and 172.16.2.128/25 networks are overlapping networks that can be seen by R1,but not between R2 and R3.
E.The 172.16.3.0/29 network used on the Frame Relay links is creating a discontiguous network between the R2 and R3 router subnetworks.

3.单项选择题Which statement about vlan operation on cisco catalyst switches is true?()

A.when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table
B.unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C.ports between switches should be configured in access mode so that vlans can span across the ports
D.broadcast and multicast frames are retransmitted to ports that are configured on different vlan.

4.单项选择题What is an appropriate use of a default route?()

A.to provide routing to a local web server
B.to provide routing from an ISP to a stub network
C.to provide routing that will override the configured dynamic routing protocol
D.to provide routing to a destination that is not specified in the routing table and which is outside the local network

5.多项选择题Which two statements describe the advantages to the use of RIP over the use of OSPF?()

A.RIP requires less time to converge
B.RIP uses less bandwidth
C.RIP is less complex to configure
D.RIP demands fewer router resources
E.RIP has a more accurate metric

6.单项选择题What is valid reason for a switch to deny port access to new devices when port security is enabled? ()

A.The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B.The denied MAC address are statically configured on the port.
C.The minimum MAC threshold has been reached.
D.The absolute aging times for the denied MAC addresses have expired.

7.单项选择题A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

A.an OSPF update for network 192.168.0.0/16
B.a static router to network 192.168.10.0/24
C.a static router to network 192.168.10.0/24 with a local serial interface configured as the next hop
D.a RIP update for network 192.168.10.0/24
E.a directly connected interface with an address of 192.168.10.254/24
F.a default route with a next hop address of 192.168.10.1

9.多项选择题Which two statements are true regarding EIGRP?()

A.Passive routes are in the process of being calculated by DUAL.
B.EIGRP supports VLSM,route summarization,and routing update authentication.
C.EIGRP exchanges full routing table information with neighboring routers with every update.
D.If the feasible successor has a higher advertised distance than the successor route,it becomes theprimary route.
E.A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

最新试题

请参见图示。主机B 尝试与主机C 建立TCP/IP 会话。在尝试期间,San Francisco 器由器的FastEthernet 接口fa0/1捕获到一个帧。捕获的帧中包含源IP 地址为10.10.1.2而目的IP 地址为10.31.1.20的数据包。捕获该帧时,它的目的MAC 地址是什么?()

题型:单项选择题

请参见图示。下列哪组设备仅包含中间设备?()

题型:单项选择题

请参见图示。网络技术人员使用图中所示的连接将主机A 连接到路由器以创建初始配置。下列有关此连接的陈述中哪一项正确?()

题型:单项选择题

请参见图示。从主机X 发出的到主机Y 的tracert 命令已成功。下列哪一项正确地反映了追踪列表中显示的中间网络设备的顺序?()

题型:单项选择题

在Cisco IOS 设备中,启动配置文件存储于何处?()

题型:单项选择题

以下哪两种介质可提供高达1Gb/s 的带宽?()

题型:多项选择题

请参见图示。主机A 正在访问多台服务器。结合使用什么端口号和地址即可唯一识别特定服务器上运行的特定进程?()

题型:单项选择题

请参见图示。主机A 尝试与主机C 建立TCP/IP 会话。在尝试期间,路由器Y 的FastEthernet 接口fa0/1捕获到一个帧。捕获的帧中包含源IP 地址为172.16.1.5而目的IP 地址为172.16.7.24的数据包。捕获该帧时,它的源MAC 地址是什么?()

题型:单项选择题

请参见图示。哪种逻辑拓扑是对图示网络的准确描述?()

题型:单项选择题

OSI 模型的哪两项功能在第2层实现?()

题型:多项选择题