网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()

  • A、Nothing, wide metrics are used by default in IS-IS
  • B、Enable wide-metrics-only under protocol IS-IS
  • C、Enable traffic-engineering under protocols IS-IS
  • D、Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).

参考答案

更多 “What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A、Nothing, wide metrics are used by default in IS-ISB、Enable wide-metrics-only under protocol IS-ISC、Enable traffic-engineering under protocols IS-ISD、Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).” 相关考题
考题 By default, which IS-IS metric types does JUNOS software support?() A. receiving of wide metrics onlyB. sending of narrow metrics onlyC. receiving of narrow metrics onlyD. sending and receiving of narrow and wide metrics

考题 What are two commands that can be used to configure MBGP for multicast?() A. Under the BGP group, configure family inet any.B. Use the set protocol MBGP command to enable MBGP.C. Under the BGP group, configure family inet multicast.D. Use the set rib-group command to copy the multicast routes into inet.1.

考题 In JUNOS software, which command is used to configure TED support for OSPF?() A. set protocols rsvp cspf-enableB. set protocols mpls cspf-enableC. set protocols rsvp traffic-engineeringD. set protocols ospf traffic-engineering

考题 When using OSPF as your IGP, which operational command must be enabled to populate the TED forCSPF calculations?() A. cspf enableB. disable no-cspfC. traffic-engineeringD. enable traffic-engineering-database

考题 What are the basic configuration steps to enable IS - IS?() A. Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B. Configure the net sy stem - id and the network net - id commands under routerisis.C. Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.D. Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.E. Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

考题 Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A、aaa authentication enable method defaultB、aaa authentication enable defaultC、aaa authentication enable levelD、aaa authentication enable default local

考题 Examine the following options ,when editing global IPS settings, which one determines if the IOS- basedIPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for thatengine is being compiled?()A、Enable Signature DefaultB、Enable Engine Fail ClosedC、Enable Default IOS Signature ActualTests.comD、Enable Fail Opened

考题 The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A、 Enable VTP pruning on any client switch in the management domain.B、 Enable VTP pruning on any switch in the management domain.C、 Enable VTP pruning on every switch in the management domain.D、 Enable VTP pruning on a VTP server in the management domain.E、 Disable VTP pruning on a VTP server in the management domain.

考题 What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1

考题 What protocol is used for Path Setup in MPLS traffic engineering?()A、OSPFB、ISISC、BGPD、RSVPE、PIM

考题 In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used

考题 As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

考题 After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.

考题 Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

考题 By default, which IS-IS metric types does JUNOS software support?()A、receiving of wide metrics onlyB、sending of narrow metrics onlyC、receiving of narrow metrics onlyD、sending and receiving of narrow and wide metrics

考题 What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet any.B、Use the set protocol MBGP command to enable MBGP.C、Under the BGP group, configure family inet multicast.D、Use the set rib-group command to copy the multicast routes into inet.1.

考题 What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A、No action required, wide metrics are used by default in IS-IS.B、Enable wide-metrics-only under protocols IS-IS.C、Enable traffic-engineering under protocols IS-IS.D、Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).

考题 In JUNOS software, which command is used to configure TED support for OSPF?()A、set protocols rsvp cspf-enableB、set protocols mpls cspf-enableC、set protocols rsvp traffic-engineeringD、set protocols ospf traffic-engineering

考题 When using OSPF as your IGP, which operational command must be enabled to populate the TED for CSPF calculations?()A、cspf enableB、disable no-cspfC、traffic-engineeringD、enable traffic-engineering-database

考题 You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

考题 You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()A、Enable Anonymous access. Enable Integrated Windows authentication.B、Enable Anonymous access. Enable Basic authentication.C、Disable Anonymous access. Enable Integrated Windows authentication.D、Disable Anonymous access. Enable Basic authentication.

考题 单选题What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A  Enable VTP pruning on any client switch in the management domain.B  Enable VTP pruning on any switch in the management domain.C  Enable VTP pruning on every switch in the management domain.D  Enable VTP pruning on a VTP server in the management domain.E  Disable VTP pruning on a VTP server in the management domain.

考题 单选题What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A Nothing, wide metrics are used by default in IS-ISB Enable wide-metrics-only under protocol IS-ISC Enable traffic-engineering under protocols IS-ISD Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).

考题 单选题What protocol is used for Path Setup in MPLS traffic engineering?()A OSPFB ISISC BGPD RSVPE PIM

考题 单选题What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A No action required, wide metrics are used by default in IS-IS.B Enable wide-metrics-only under protocols IS-IS.C Enable traffic-engineering under protocols IS-IS.D Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).

考题 单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A The enable password is present for backward compatibility.B Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.