A.Spanning Tree Protocol(STP)
B.Delay reduction
C.Hot Standby Routing Protocol(HSRP)
D.Dynamic routing protocols
E.Quality of Service(QoS)
F.Jitter management
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. On the basis of the information presented, which statement is true?()
A.OSPF router 5.0.0.2 is an ABR
B.Network 6.0.0.0/8 was learned from an OSPF neighbor within the area
C.The default route is learned from an OSPF neighbor
D.A default route is configured on the local router
From the perspective of routerPG-1,what kind of router is the router with IP address 192.23.1.1()
A.A peer router runningIBGP
B.A peer router runningEBGP
C.A community member running IBGP
D.A peer group member running IBGP
E.A peer group member running EBGP
A.The K-values do not match
B.The hold times do not match
C.The hello times do not match
D.The AS numbers do not match
A.debug eigrp packets
B.show ip eigrp traffic
C.show ip eigrp topology
D.show ip eigrp neighbors
A.Some query or reply packets are lost between the routers
B.The neighboring router starts receiving route updates from this router
C.A failure causes traffic on a link between two neighboring routers to flow in only one direction(unidirectional link)
D.The neighboring router stops receiving ACK packets from this router
最新試題
cisco ios command to interface dialer 0
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
Drag and drop each management protocol on the above to the correct category on the below.
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()