A. Implement threshold monitoring using RMON.
B. Poll and record specific SNMP MIB objects from the device
C. Verify that the SNMP MIB is supported in the relevant core device.
D. Implement monitoring using SNMP or RMON.
您可能感興趣的試卷
你可能感興趣的試題
A. logging on
B. logging host 10.1.5.5
C. logging console notifications
D. logging trap notifications
A. syslog logging
B. console logging
C. buffered logging
D. terminal logging
A. To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B. To improve the IGP convergence time
C. To hide visibility to the core (provider) routers in the MPLS network
D. To provide a visible extension of IP TTL functionality in an MPLS-enabled domain
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
A. A pointer to the address where a RADIUS server can be located
B. A sequential list of user authentication methods
C. A description of what a user can execute on a router
D. The setup for the authentication phase on a router
最新試題
Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
Which of the following allows network administrators to easily apply common services and employ features across Cisco switches, routers, and access points with an intuitive GUI?()
You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()
Refer to the exhibit. For the given configuration, on packets leaving the router on interface FastEthernet0/0 that matches the high traffic class, what will the MPLS experimental bit be set to?()
As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()
You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()
Which keyword is used with the show ip bgp neighbors [keyword] command to display all routes that are received and accepted from a neighbor?()
With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()
In a RSTP implementation, which of the following two link types are used? ()(Choose two.)