网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
What parameters must you specify when you enable EIGRP routing?()

A. The broadcast address, and AS number

B. The network number and AS number

C. EIGRP routing, network number and passive interface

D. EIGRP routing, network number, and AS


参考答案

更多 “ What parameters must you specify when you enable EIGRP routing?() A. The broadcast address, and AS numberB. The network number and AS numberC. EIGRP routing, network number and passive interfaceD. EIGRP routing, network number, and AS ” 相关考题
考题 You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database.What must you do accomplish this task?() A. Enable supplemental logging for the database.B. Specify undo retention guarantee for the databaseC. Create Flashback Data Archive in the tablespace where the tables are stored.D. Create Flashback Data Archive and enable Flashback Data Archive for specific tables

考题 Which statement is true when you enable SSL for the WebUI?() A. SSL is enabled for the WebUI by default.B. You must address the WebUI using HTTPS://.C. You must change the WebUI port when enabling SSL.D. The demokey and democert are applied to the WebUI by default.

考题 You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.

考题 You have implemented mutua l route redistribution between OSPF and EIGRP on a border router. When checking the routing table on one of the EIGRP routers within the EIGRP routing domain, you are seeing some, but not all of the expected routes.What should you verify to troubleshoot this problem?()A. The border router is using a proper seed metric for OSPFB. The border router is using a proper seed metric for EIGRPC. The administrative distance is set for OSPF and EIGRPD. The missing OSPF routes are present in the routing table of the border routerE. The subnet keyword on the border router in the redistribute OSPF command

考题 You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

考题 Half of your network uses RIPv2 and the other half runs OSPF. The networks do not communicate with each other. Which two of these factors describe the impact of activating EIGRP over each separate part? ()A、EIGRP will not be accepted when configured on the actual RIPv2 routers.B、OSPF will no longer be used in the routing table, because you only have EIGRP internal routes running.C、OSPF will no longer be used in the routing table, because you only have EIGRP external routes running.D、RIPv2 will populate its RIP database but not its routing table, because you only have EIGRP external routes running.E、RIPv2 will populate its RIP database but not its routing table, because you only have EIGRP internal routes running.F、OSPF database will have RIPv2 routes.

考题 What parameters must you specify when you enable EIGRP routing?()A、The broadcast address, and AS numberB、The network number and AS numberC、EIGRP routing, network number and passive interfaceD、EIGRP routing, network number, and AS

考题 A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 You have implemented mutua l route redistribution between OSPF and EIGRP on a border router. When checking the routing table on one of the EIGRP routers within the EIGRP routing domain, you are seeing some, but not all of the expected routes. What should you verify to troubleshoot this problem?()A、The border router is using a proper seed metric for OSPFB、The border router is using a proper seed metric for EIGRPC、The administrative distance is set for OSPF and EIGRPD、The missing OSPF routes are present in the routing table of the border routerE、The subnet keyword on the border router in the redistribute OSPF command

考题 What network information do you need when you plan to implement a VLAN-based solution?()A、default VLAN information for all unused switch portsB、802.1x configuration parameters C、number of IP subnets neededD、IP routing protocol information

考题 Which two steps below should you perform on the hub router while configuring EIGRP routing over  DMVPN (mGRE tunnel)? ()A、Set the NHRP hold time to match the EIGRP hold timeB、Add the enable eigrp stub commandC、Add the disable eigrp as-member split-horizon commandD、Add the disable eigrp as-member next-hop-self command

考题 Which statement is true when you enable SSL for the WebUI?()A、SSL is enabled for the WebUI by default.B、You must address the WebUI using HTTPS://.C、You must change the WebUI port when enabling SSL.D、The demokey and democert are applied to the WebUI by default.

考题 You are shrinking the SCOTT.EMP table by executing the ALTER TABLE SCOTT.EMP SHRINK SPACE CASCADE statement. What is a prerequisite for shrinking the SCOTT.EMP table?()A、 You must enable the block change tracking feature.B、 You must have enable the flashback feature.C、 You must use the OMF in your database.D、 You must define the tablespace of the SCOTT.EMP table for automatic segment space management.

考题 You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database. What must you do accomplish this task?()A、 Enable supplemental logging for the database.B、 Specify undo retention guarantee for the databaseC、 Create Flashback Data Archive in the tablespace where the tables are stored.D、 Create Flashback Data Archive and enable Flashback Data Archive for specific tables

考题 You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have received instructions from the CIO to enable Autodiscover for Internet users by creating a resource record in DNS.What actions must you take?()A、You must set up recipient filtering.B、You must set up a Host (A).C、You must use a TXT record.D、You must use a Pointer (PTR) record.E、You must use a Mail exchange (MX) record.

考题 You need to ensure that the Cust_CalcData column is implemented appropriately. What should you do?()A、Specify that the Cust_CalcData column must be implemented as a computed column of the table. B、Specify that the Cust_CalcData column must be indexed using a non-clustered index.C、Specify that the Cust_CalcData column must be implemented as a column that uses a user-defined data type.D、Specify that the Cust_CalcData column must be updated by a SQL Server Agent job that runs nightly.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

考题 You need to install Windows 2000 Professional on a new computer in your network. You use the Setup Manager wizard to configure a fully automated installation script file. You begin an unattended installation and leave the office.   When you return, the installation has reached the GUI-mode Setup and you see the following error message. “Unattended Setup is unable to continue because a Setup parameter specified by you system administrator or computer manufacturer is missing or invalid.”  You need to complete the installation.  What must you do?()A、 In the Unattended section of the answer file, set the OemPreinstall property to Yes.B、 In the NetBinding section of the answer file, specify the Enable variable.C、 In the UserData section of the answer file, specify the ProductID variable.D、 In the GuiUnattended section of the answer file, set the OemSkipWelcome property to 1

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A SQL Server Agent job is failing. You find that the job history information is incomplete and seems to be truncated after you review it. All information produced by a job must be available for viewing.  So what action should you perform to achieve this goal? () A、You should enable notifications to the Windows application event log when the job completes. B、You should enable write OEM file C、You should enable all job steps, making them send the output to a file D、You should include execution trace messages in the SQL Agent Error log

考题 单选题What parameters must you specify when you enable EIGRP routing?()A The broadcast address, and AS numberB The network number and AS numberC EIGRP routing, network number and passive interfaceD EIGRP routing, network number, and AS

考题 单选题You have implemented mutua l route redistribution between OSPF and EIGRP on a border router. When checking the routing table on one of the EIGRP routers within the EIGRP routing domain, you are seeing some, but not all of the expected routes. What should you verify to troubleshoot this problem?()A The border router is using a proper seed metric for OSPFB The border router is using a proper seed metric for EIGRPC The administrative distance is set for OSPF and EIGRPD The missing OSPF routes are present in the routing table of the border routerE The subnet keyword on the border router in the redistribute OSPF command

考题 单选题You are shrinking the SCOTT.EMP table by executing the ALTER TABLE SCOTT.EMP SHRINK SPACE CASCADE statement. What is a prerequisite for shrinking the SCOTT.EMP table?()A  You must enable the block change tracking feature.B  You must have enable the flashback feature.C  You must use the OMF in your database.D  You must define the tablespace of the SCOTT.EMP table for automatic segment space management.

考题 单选题You are the network administrator for The network is distributed across five countries in Europe, namely Spain, Italy, Hungary, Austria, and Germany. All network servers run Windows Server 2003. Each location has three print servers. You need to monitor usage of print queues on all print servers on the network. You plan to enable monitoring for each print server in the same way. Monitoring data must be stored in a central location and archived for five years to enable data comparison. What should you do?()A Create a counter log and specify SQL Database as the log file type.B Create a trace log and specify Circular Trace File as the log file type.C Create a counter log and specify Binary Circular File as the log file type.D Create a trace log and specify Sequential Trace File as the log file type.

考题 多选题Half of your network uses RIPv2 and the other half runs OSPF. The networks do not communicate with each other. Which two of these factors describe the impact of activating EIGRP over each separate part?()AEIGRP will not be accepted when configured on the actual RIPv2 routers.BOSPF will no longer be used in the routing table, because you only have EIGRP internal routes running.COSPF will no longer be used in the routing table, because you only have EIGRP external routes running.DRIPv2 will populate its RIP database but not its routing table, because you only have EIGRP external routes running.ERIPv2 will populate its RIP database but not its routing table, because you only have EIGRP internal routes running.FOSPF database will have RIPv2 routes.

考题 单选题What network information do you need when you plan to implement a VLAN-based solution?()A default VLAN information for all unused switch portsB 802.1x configuration parameters C number of IP subnets neededD IP routing protocol information