單項選擇題Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()

A.Fault management
B.Accounting management
C.Operations management
D.Performance management
E.Security management
F.Configuration management


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of the following commands provides data plane information required to forward a packet toa specific ip address?()

A.sh ip route
B.sh ip cef 〈ip_address〉
C.sh adjacency 〈ip_address〉
D.sh ip route 〈ip_addres$〉
E.sh ip adjacency 〈/p_address〉
F.sh ip cef 〈mac_addrQss〉〈ip_address〉

2.多項選擇題Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()

A.The port must be put into forwarding state manually after root-inconsistent state has beencorrected
B.A Root Guard port receiving superior BPDU goes into a root-inconsistent state
C.A Root Guard port receiving inferior BPDU goes into a root-inconsistent state
D.While the port is in a root-inconsistent state no user data is sent across that port
E.The port returns to a forwarding state if inferior BPDUs stop
F.It should be applied to all switch ports

3.多項選擇題Which of the following would provide good baseline documentation to have on hand whenanalyzing potential problems?(Choose all that apply.)()

A.User authentication ID and password
B.User profile
C.Output of debug
D.Output of show interface
E.Result of ping
F.Output of show process cpu

4.多項選擇題Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()

A.User authentication
B.Overlapping IP address space
C.GRE or IPsec configuration
D.MTU size
E.VPN client software
F.Authentication server configured ly

5.多項選擇題Which of the following are TACACS+ characteristics?(Choose all that apply.)()

A.Cisco proprietary
B.Standards-based protocol
C.Provides separate services for authentication, authorization, and accounting
D.Encrypts only the password
E.Uses UDP for a transport layer
F.Encrypts the entire packet

最新試題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:單項選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:單項選擇題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:單項選擇題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項選擇題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:問答題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:單項選擇題

Which statement about PPPoA configuration is correct?()

題型:單項選擇題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:問答題