单项选择题The enable secret command is used to secure access to which CLI mode?()

A. user EXEC mode
B. global configuration mode
C. privileged EXEC mode
D. auxiliary setup mode


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which statement about vlan operation on cisco catalyst switches is true?()

 A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
B. unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C. ports between switches should be configured in access mode so that vlans can span across the ports
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.

2.单项选择题A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

A. an OSPF update for network 192.168.0.0/16
B. a static router to network 192.168.10.0/24
C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next hop
D. a RIP update for network 192.168.10.0/24
E. a directly connected interface with an address of 192.168.10.254/24
F. a default route with a next hop address of 192.168.10.1

4.单项选择题Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network addres?()

A. 172.16.16.0
B. 172.16.24.0
C. 172.16.0.0
D. 172.16.28.0

5.单项选择题Which command can be used to verify the DLCI destination address in a Frame Relay static configuration?()

A. show frame-relay end-to-end
B. show frame-relay map
C. show frame-relay lmi
D. show frame-relay pvc

7.单项选择题In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?()

A. after broken links are re-established
B. in an improperly implemented redundant topology
C. when upper-layer protocols require high reliability
D. during high traffic periods
E. when a dual ring topology is in use

8.单项选择题Which command sets and automatically encrypts the privileged enable mode password?()

A. enbale password c1sco
B. secret enable c1sco
C. password enable c1sco
D. enable secret c1sco

9.单项选择题Which statement is true?()

A. An IPv6 address is 64 b long and is represented as hexadecimal characters.
B. An IPv6 address is 32 b long and is represented as decimal digits.
C. An IPv6 address is 128 b long and is represented as decimal digits.
D. An IPv6 address is 128 b long and is represented as hexadecimal characters.

10.单项选择题When upgrading the IOS image, the network administrator receives the exhibited error message. What could be the cause of this error?()

A. The new IOS image is too large for the router flash memory.
B. The TFTP server is unreachable from the router.
C. The new IOS image is not correct for this router platform.
D. The IOS image on the TFTP server is corrupt.
E. There is not enough disk space on the TFTP server for the IOS image.

最新试题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

题型:单项选择题

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

题型:单项选择题

Which statement describes the rule of split horizon?()

题型:单项选择题

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

题型:单项选择题

On which options are standard access list based?()

题型:单项选择题

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

题型:单项选择题

At which layer of the OSI model dose PPP perform?()

题型:单项选择题

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

题型:单项选择题

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

题型:单项选择题