单项选择题Which IPsec security protocol should be used when confidentiality is required?()

A. AH
B. MD5
C. PSK
D. ESP


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which command can you use to manually assign a static IPV6 address to a router interface?()

A. ipv6 address PREFIX_1::1/64
B. ipv6 autoconfig 2001:db8:2222:7272::72/64
C. ipv6 autoconfig
D. ipv6 address 2001:db8:2222:7272::72/64

2.单项选择题Why will a switch never learn a broadcast address?()

A. Broadcast frames are never sent to swiches.
B. Broadcast addresses use an incorrect format for the switching table.
C. A broadcast address will never be the source address of a frame.
D. Broadcasts only use network layer addressing.
E. A broadcast frame is never forwarded by a switch.

3.单项选择题Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()

A. link bandwidth
B. hop count
C. link cost
D. administrative distance
E. link delay

4.单项选择题VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?()

A. The command is accepted and the respective VLAN is added to vlan dat.
B. The command is rejected.
C. The command is accepted and you must configure the VLAN manually.
D. The port turns amber.

5.单项选择题The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()

A. 10.10.0.0/18 subnetted with mask 255.255.255.252
B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252

6.单项选择题Which component of VPN technology ensures that data can be read only by its intended recipient?()

A. data integrity
B. encryption
C. key exchange
D. authentication

8.单项选择题When a host transmits data across a network to another host, which process does the data go through?()

A. standardization
B. conversion
C. encapsulation
D. synchronization

9.单项选择题A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()

A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com

10.单项选择题Which line from the output of the show ip interface command indicates a layer 1 problem?()

A. Serial0/1 is up, line protocol is down
B. Serial0/1 is down, line protocol is down
C. Serial0/1 is up, line protocol is up
D. Serial0/1 is administratively down, line protocol is down

最新试题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题

Which IPsec security protocol should be used when confidentiality is required?()

题型:单项选择题

At which layer of the OSI model is RSTP used to prevent loops?()

题型:单项选择题

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

题型:单项选择题

At which layer of the OSI model dose PPP perform?()

题型:单项选择题

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

题型:单项选择题

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

题型:单项选择题

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

题型:单项选择题

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

题型:单项选择题

Which command displays the CHAP authentication process as it occurs between two routers?()

题型:单项选择题