單項(xiàng)選擇題Which of the following topology situations would be a qood candidate for configuring DMVPN()

A.Extranet VPN
B.Managed overlay VPN topology
C.Hub-and-spoke VPN topology
D.Central-site VPN topology
E.Full mesh VPN topology
F.Remote-access VPN topology


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following is not an essential prerequisite for AutoQoS to be correctly applied to an interface()

A.The interface must be configured as a Multilink PPP interface.
B.The correct bandwidth should be configured on the interface.
C.A QoS policy must not be currently attached to the interface.
D.CEF must be enable
E.AutoQoS must be enabled globally before it can be enabled on the interface.
F.An IP address must be configured on the interface if its speed is equal to or less than 768 kbps.

2.單項(xiàng)選擇題Which IOS command would you enter if you wanted to view a list of IBGP and EBGP neighborrelationships that are configured?()

A.show ip bgp
B.show ip bgp paths
C.show ip bgp peers
D.show ip bgp summary
E.show ip bgp protocols

4.單項(xiàng)選擇題Which IOS command would you use to find out which networks are routed by a particular OSPFprocess?()

A.show ospf
B.show ip route
C.show ip protocols
D.show ip ospf database
E.None of the other alternatives apply

5.單項(xiàng)選擇題

Exhibit:

You work as a network technician. You trainee shows you the IOS command output displayed inthe exhibit. What command did Tess use to produce this output?()

A.show ip RIP
B.show ipv6 ospf
C.show ip ospf
D.show ip ospf interface
E.show ipv6 ospf interface
F.show ipv4 ospf
G.None of the other alternatives apply

最新試題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:單項(xiàng)選擇題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:單項(xiàng)選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:問答題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:單項(xiàng)選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項(xiàng)選擇題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題