A. logging on
B. logging host 10.1.5.5
C. logging console notifications
D. logging trap notifications
您可能感興趣的試卷
你可能感興趣的試題
A. syslog logging
B. console logging
C. buffered logging
D. terminal logging
A. To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B. To improve the IGP convergence time
C. To hide visibility to the core (provider) routers in the MPLS network
D. To provide a visible extension of IP TTL functionality in an MPLS-enabled domain
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
A. A pointer to the address where a RADIUS server can be located
B. A sequential list of user authentication methods
C. A description of what a user can execute on a router
D. The setup for the authentication phase on a router
A. Apply the method list to an interface
B. Specify the default method list and apply it to the interface
C. Enable AAA
D. Define a method list
最新試題
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
What is the maximum number of Cisco Catalyst 3750 Series Switches that can be united into a single manageable unit using the Cisco StackWise technology?()
What are four advantages to using tunnel brokers in an IPv6 transition environment?()
Which of the following allows network administrators to easily apply common services and employ features across Cisco switches, routers, and access points with an intuitive GUI?()
With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()
Refer to the exhibit. Which two of these events will be the result of issuing the above command? ()(Choose two.)
When a Cisco router is configured for SSH, it acts as an ()?
Refer to the exhibit. You want to minimize the downtime that results from supervisor engine switchovers on Cisco 6500 Series Switches and Cisco 7600 Series Routers. To achieve this, you are considering deploying a Cisco Nonstop Forwarding with Stateful Switchover solution using OSPF.In the exhibit you can see the output of the show ip ospf neighbor detail command.Which trait of systems using Cisco Nonstop Forwarding with Stateful Switchover and OSPF is shown in the exhibit output and will impact your plan?()
Which command displays only those entries in a BGP table with specific AS_PATH attributes?()
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)