单选题Refer to the exhibit. Which statement is correct based on the show login command output shown?()AWhen the router goes into quiet mode, any host is permitted to access the router via Telnet,SSH, and HTTP,since the quiet-mode access list has not been configured.BThe login block-for command is configured to block login hosts for 93 seconds.CAll logins from any sources are blocked for another 193 seconds.DThree or more login requests have failed within the last 100 seconds.

单选题
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
A

When the router goes into quiet mode, any host is permitted to access the router via Telnet,SSH, and HTTP,since the quiet-mode access list has not been configured.

B

The login block-for command is configured to block login hosts for 93 seconds.

C

All logins from any sources are blocked for another 193 seconds.

D

Three or more login requests have failed within the last 100 seconds.


参考解析

解析: 暂无解析

相关考题:

Which statement is correct regarding exception traffic processing?() A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries

Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task that shuts down all unused interfaces.C. It sho uld include tasks that enable and verify OSPF authentication.D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.

Refer to the exhibit. Router C was configured so that it could form an adja cency with three OSPF neighbors, one connected to each of its three physical interfaces. Which statement is correct about router C?()A. It is configured and functioning correctly as an OSPF internal router.B. It is configured and functioning correc tly as an ABR attached to stub area 4.C. It is configured and functioning correctly as an ASBR attached to external area 4.D. It is configured and functioning correctly as an ABR attached to totally stubby area 4.E. It is not configured correctly to function as specified.

Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?() A. The crypto isakmp configuration is not correct.B. The crypto map configuration is not correct.C. The interface tunnel configuration is not correct.D. The network configuration is not correct; netw ork 172.16.1.0 is missing.

Refer to the exhibit. Which th ree commands should be used on router B1 to redistribute the EIGRP AS 10 routes into RIP?() A. router ripB. router eigrp 10C. redistribute eigrp 10D. redistribute ripE. default - metric 10000 100 255 1 1500F. default - metric 5

Refer to the exhibit. The partial configuration for an OSPF ASBR and an Area 0 ABR is shown. Assume the OSPF configurations throughout the network are operable. Which statement about these configurations is true? ()A. The ASBR route - maps are basically useless, because there are no deny prefix - lists.B. LSA Type 5s wil l not be received by the ABR from the ASBR.C. The OSPF backbone will not learn any RFC 1918 addresses.D. The matched prefix - list addresses will be given a metric of 255, which is essentially unreachable.

Refer to the exhibit. Based upon the information in the exhibit, which statement is true?() A. DHCP requests from the host will be rebroadcasted to R2.B. To complete t his configuration, the R1 fa0/0 interface must be configured with the ip helper - addresses command.C. To complete this configuration, the R2 fa0/0 interface must be configured with the ip helper -addresses command.D. R1 will forward all DHCP requests t o both 192.168.100.1 and 192.168.200.1 as unicast messages.E. R1 will forward DHCP requests to 192.168.100.1. If there is no response, R1 will then forward the requests to 192.168.200.1.

Refer to the exhibit. Which statement is true? () A. Only traffic with a destination from 10.10.0.0/19 will be permitted.B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.C. Only traffic going to 10.10.0.0/19 will be permitted.D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.

Refer to the exhibit. Which two statement s are correct?() A. All the routes were redistributed into BGP from an IGPB. All the routes were originated by BGP with the network commandC. All six routes will be installed in the routing tableD. Four routes will be installed in the routing ta bleE. Two routes will be installed in the routing table

Refer to the exhibit. Which statement is true about the configuration? () A. RTA will not establish an OSPF adjacency w ith RTBB. RTA will send OSPF hello packets, but will not send OSPF updatesC. RTA will not accept OSPF hello packets from RTBD. RTA will send OSPF updates, but will not establish an adjacency with RTB

Refer to the exhibit. Which two statements about the topologies shown are correct?() A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.

Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Q- complaint trunk to another switch. Based on the output shown, What is the reason the trunk does not form, even thought the proper cabling has been attached?()A.VLANs have not been created yetB.An IP address must be configured for the portC.The port is currently configured for access modeD.The correct encapsulation type has not been configuredE.The no shutdown command has not been entered for the port

Refer to the exhibit. Which statement is true?() A.The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.B.VLAN 20 is running the Per VLAN Spanning Tree Protocol.C.The MAC address of the root bridge is 0017.596d.1580.D.SwitchA is not the root bridge, because not all of the interface roles are designated.

Refer to the exhibit. Based on the information given. Which switch will be elected root bridge and why?() A.Switch A ,because it has the lowest MAC addressB.Switch C,because it has the lowest priorityC.Switch B,because it has the highest MAC addressD.Switch C,because it is the most centrally located switchE.Switch A,because it is the most centrally located switchF.Switch D,because it has the highest priority

Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?() A.10.0.0.0B.10.0.0.254C.192.223.129.0D.192.223.129.254

Refer to the exhibit. Which statement is correct based on the show login command output shown?()A、When the router goes into quiet mode, any host is permitted to access the router via Telnet,SSH, and HTTP,since the quiet-mode access list has not been configured.B、The login block-for command is configured to block login hosts for 93 seconds.C、All logins from any sources are blocked for another 193 seconds.D、Three or more login requests have failed within the last 100 seconds.

多选题Refer to the exhibit. Which two statements are correct? (Choose two.)()AAll six routes will be installed in the routing table.BTwo routes will be installed in the routing table.CFour routes will be installed in the routing table.DAll the routes were redistributed into BGP from an IGP.EAll the routes were originated by BGP with the network command.

单选题Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()A Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. B Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. C Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. D Throughput results are unrelated to the Teleworker PC configuration or current PC use.

多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

单选题Which statement is correct regarding exception traffic processing?()AException traffic is only handled by the PFEBException traffic is rate-limited across the internal link to protect the RECException traffic is not prioritized during times of congestionDException traffic is forwarded based on forwarding table entries

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

单选题Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()A ip dhcp pool ClientB network 10.1.1.0 255.255.255.240C default-router 10.1.1.1D dns-server 10.2.2.2E domain-name cisco.comF option 150 ip 10.3.3.3

单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A  WPA/WPA2/CCKMB  WPA/WPA2 PassphraseC  802.1xD  Pre-Shared Key (Static WEP)