单选题A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()AMain(config)#interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#no shutBMain(config)#interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf Main(config-if)#no shutCMain(config)#interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation frame-relay Main(config-if)#authenication chap Main(config-if)#no shutDMain(config)#interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ppp Main(config-if)#no shut

单选题
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
A

Main(config)#interface serial 0/0  Main(config-if)#ip address 172.16.1.1 255.255.255.252  Main(config-if)#no shut

B

Main(config)#interface serial 0/0  Main(config-if)#ip address 172.16.1.1 255.255.255.252  Main(config-if)#encapsulation ietf Main(config-if)#no shut

C

Main(config)#interface serial 0/0  Main(config-if)#ip address 172.16.1.1 255.255.255.252  Main(config-if)#encapsulation frame-relay  Main(config-if)#authenication chap Main(config-if)#no shut

D

Main(config)#interface serial 0/0  Main(config-if)#ip address 172.16.1.1 255.255.255.252   Main(config-if)#encapsulation ppp Main(config-if)#no shut


参考解析

解析: 暂无解析

相关考题:

The Ezonexam network administrator needs to a switch named VE1 to become the root bridge for a redundant path switched network. What can be done to ensure that VE1 will always assume the role as the root bridge?A.Assign the switch a higher MAC address than the other switches in the network haveB.Establish a direct link from the switch to all other switches in the networkC.Configure the switch full-duplex operation and configure the other switches for half-duplex operationD.Configure the switch so that it has lower priority than other switches in the networkE.None of the above

HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network.Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A. a shared single interfaceB. the ability to track serial interfacesC. UDP-based hello packetsD. the impact of flapping links if timers are too low

Refer to the exhibit.The actual speed of the serial links between R2 and R3 are 256 kb/s and 512k b/s respectively. When configuring EIGRP on routers R2 and R3, the network administrator configured the bandwidth of both serial interfaces to 512 kb/s. What will be the effect?()A. EIGRP will overutilize the 512 kb/s link.B. The interface delay value used in the EIGRP metric calculation will be inaccurate on the 256k b/s serial interface.C. The amount of bandwidth used for EIGRP routing protocol traffic on the 256 kb/s link can become excessive.D. EIGRP can load balance between the two serial links only if the variance is set to 2 or higher.E. Unequal cost load balancing will be disabled.

You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?() A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.

A user complains that the network printer is not printing.  The system administrator knows there is a print queue for the network printer and needs to check on the queue.  Which command is run?()A、 netstat B、 lpstat C、 telinit D、 prtconf

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection

HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A、a shared single interfaceB、the ability to track serial interfacesC、UDP-based hello packetsD、the impact of flapping links if timers are too low

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication

A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A、Establish a direct link from the switch to all other switches in the network.B、Assign the switch a higher MAC address than the other switches in the network have.C、Configure the switch so that it has a lower priority than other switches in the network.D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable

On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC

A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

During a planning session, it is determined that a three node cluster (Node ’A’, Node ’B’, and Node ’C’) will meet the customer’s application needs. Node ’B’ will be a hot-standby fallover node for both Node ’A’ and Node ’C’ resource groups.  A serial network for this cluster will require which connections?()  A、 A single serial network between Node ’A’ and Node ’B’ and Node ’C’B、 A point-to-point link between Node ’A’ and Node ’C’,and Node ’B’ and Node ’C’C、 A serial network between Node ’A’ and Node ’C’,and a serial network between Node ’B’ and Node ’C’D、 A point-to-point link between Node ’A’ and Node ’B’ Node ’B’ and Node ’C’ and Node ’A’ ad Node ’C’

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()A、You must configure the host (A) resource records.B、You must add and configure an IPSec Enforcement Network policy.C、You must create an Outlook Web App Mailbox policy.D、You must use the Set-ADSiteLink cmdlet.

You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()A、Enroll each administrative account for a smart card authentication certificate.B、Configure autoenrollment for computer authentication certificates. C、Install a smart card reader on each server computer.  D、Install a smart card reader on each network administrator’s computer.  E、Configure each administrative account to require a smart card for interactive logon.F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

You are the network administrator for ExamSheet. Laura is a sales representative for the company. She travels on a regular basis and dials into the company network from her Windows 2000 Professional portable computer. ExamSheet recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access Server for Windows 2000 to meet the requirements of the new security policy. Laura reports she now cannot initiate a dial-up connection. Laura needs to dial in to the company network. What should you do?()A、Apply the Hisecws.inf Security Template to Laura’s computer.B、Apply the Compatws.inf Security Template to Laura’s computer.C、Instruct Laura to configure her dial-up connection to use multi-link.D、Instructs Laura to configure her dial-up connection to use MS-CHAP v2.E、Instruct Laura to configure her dial-up connections to use L2TP.

多选题HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)Aa shared single interfaceBthe ability to track serial interfacesCUDP-based hello packetsDthe impact of flapping links if timers are too low

单选题A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()AEstablish a direct link from the switch to all other switches in the network.BAssign the switch a higher MAC address than the other switches in the network have.CConfigure the switch so that it has a lower priority than other switches in the network.DConfigure the switch for full-duplex operation and configure the other switches for half-duplex operation.EConnect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()AapplicationBpresentationCsessionDtransportEinternetFdata link

单选题You install a wireless router and disable the Service Set Identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.  What should you do? ()AClick the Connect to a network link, right-click the appropriate network, and then click the Connect option.BClick the View computers and devices link, right-click the wireless router, and then click the Enable option.CClick the Set up a connection or network link, and then click the Set up a wireless Ad hoc network option.DClick the Set up a connection or network link, and then click the Manually connect to a wireless network option.

多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ