单选题What are the basic configuration steps to enable IS - IS?()AConfigure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.BConfigure the net sy stem - id and the network net - id commands under routerisis.CConfigure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.DConfigure the network net - id command(s) and the is - type level -1- 2 command under routerisis.EConfigure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

单选题
What are the basic configuration steps to enable IS - IS?()
A

Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

B

Configure the net sy stem - id and the network net - id commands under routerisis.

C

Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

D

Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

E

Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


参考解析

解析: 暂无解析

相关考题:

What are the four basic Data Flow steps of an ETL process?在ETL过程中四个基本的过程分别是什么?

You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user‘s Windows credentials to your Web application. These credentials must be encrypted.What should you do? ()A. Enable Anonymous access. Enable Integrated Windows authentication.B. Enable Anonymous access. Enable Basic authentication.C. Disable Anonymous access. Enable Integrated Windows authentication.D. Disable Anonymous access. Enable Basic authentication.

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?() A. Erase flash.B. Restart the switch.C. Delete the VLAN database.D. Erase the running configuration.E. Erase the startup configuration.F. Modify the configuration register.

What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)A、Apply the method list to an interfaceB、Specify the default method list and apply it to the interfaceC、Enable AAAD、Define a method list

A customer with IPCC Express Standard reports that a script using the Database steps is not working. What is the most likely root cause?()A、The script probably has an error in the DSN configuration.B、IPCC Express Standard is not licensed for Database steps.  C、The script probably has an error in the query string.  D、There is probably an interoperability problem between IPCC Express and the database.

What are two steps that must be taken when mitigating a worm attack?()A、Inoculate systems by applying update patches. B、Limit traffic rate. C、Apply authentication. D、Quarantine infected machines. E、Enable anti-spoof measures.

What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()A、Enable the IGMP snooping capability and define the IGMP timeout period.B、Set the Ethernet multicast mode to Enabled, enable the IGMP snooping capability, and define the IGMP timeout period.C、Set the multicast monitor function to Enabled, enable the IGMP snooping capability, and define the mandatory data rate to the minimum value supported.D、Set the Ethernet multicast mode to Multicast and define the multicast group address.

Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

What’s the steps of implementing MQC?

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()A、Erase flash.B、Restart the switch.C、Delete the VLAN database.D、Erase the running configuration.E、Erase the startup configuration.F、Modify the configuration register.

As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()A、Set the enable secret command to privilege level 5B、The enable secret password is hashed using MD5C、The enable secret password is for accessing exec privilege level 5D、The enable secret password is hashed using SHAE、The enable secret password is encrypted using Cisco proprietary level 5 encryption

You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()A、Enable BPD guardB、Disable CDP on ports where it is not necessaryC、Place unused ports in a common unrouted VLAND、Prevent automatic trunk configurationE、Implement port security

You want to configure WebLogic so that Managed Servers are restarted when they are in a  FAILED state. Which three steps are necessary to accomplish this?()A、Configure Node Manager on the machines where WebLogic Managed Servers need to be  started/restarted.B、Enable "Auto Restart" in the Node Manager Configuration.C、Enable "Auto Kill if Failed" in the Node Manager Configuration.D、Enable "Auto Kill if Failed" for the Managed Server in question.E、Enable "Auto Restart" for the Managed Server in question.

Assume that you would like to clone an existing WebLogic Domain and enable some  customizations. What scenario would you choose?()A、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if needed. These steps will only clone only the domain configuration. Binaries with deployments are needed  to be cloned by operation on the file system.  B、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain"  from the context menu. In the graphical wizard, customize the domain. These steps clone the  binaries and domain configuration. If the extension is needed, perform it after cloning in the  WebLogic web-based console. C、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if it is needed. These steps clone the binaries and domain configuration.  D、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain"  from the context menu. These steps clone the binaries and domain configuration. If the customization or extension is needed, complete that after cloning in the WebLogic web-based console.  E、In the file system, copy the domain structure of the configuration directory and paste it in the new location. Modify configuration files for address and port. If further customization is needed, open the WebLogic web-based console and perform these modifications.

You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

单选题As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()ASet the enable secret command to privilege level 5BThe enable secret password is hashed using MD5CThe enable secret password is for accessing exec privilege level 5DThe enable secret password is hashed using SHAEThe enable secret password is encrypted using Cisco proprietary level 5 encryption

单选题A customer with IPCC Express Standard reports that a script using the Database steps is not working. What is the most likely root cause?()AThe script probably has an error in the DSN configuration.BIPCC Express Standard is not licensed for Database steps.  CThe script probably has an error in the query string.  DThere is probably an interoperability problem between IPCC Express and the database.

单选题What is the effect of using the service password-encryption comma()。AOnly the enable password will be encrypted.BOnly the enable secret password will be encrypted.COnly passwords configured after the command has been entered will be encrypted.DIt will encrypt the secret password and remove the enable secret password fromthe configuration.EIt will encrypt all current and future passwords.

单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()AEnable Anonymous access. Enable Integrated Windows authentication.BEnable Anonymous access. Enable Basic authentication.CDisable Anonymous access. Enable Integrated Windows authentication.DDisable Anonymous access. Enable Basic authentication.

单选题Assume that you would like to clone an existing WebLogic Domain and enable some  customizations. What scenario would you choose?()AIn the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain from the context menu. In the graphical wizard, customize and extend the domain if needed. These steps will only clone only the domain configuration. Binaries with deployments are needed  to be cloned by operation on the file system.  BIn the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain  from the context menu. In the graphical wizard, customize the domain. These steps clone the  binaries and domain configuration. If the extension is needed, perform it after cloning in the  WebLogic web-based console. CIn the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain from the context menu. In the graphical wizard, customize and extend the domain if it is needed. These steps clone the binaries and domain configuration.  DIn the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain  from the context menu. These steps clone the binaries and domain configuration. If the customization or extension is needed, complete that after cloning in the WebLogic web-based console.  EIn the file system, copy the domain structure of the configuration directory and paste it in the new location. Modify configuration files for address and port. If further customization is needed, open the WebLogic web-based console and perform these modifications.

单选题You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()AEnable the loopback setting in GPO2. Enable the Enforced option in GPO1.BEnable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.CEnable the loopback setting in GPO2. Disable the user configuration settings in GPO3.DEnable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

单选题You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()AGPT disks and basic disksBGPT disks and dynamic disksCMBR disks and basic disksDMBR disks and dynamic disks

多选题Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)AApply the method list to an interfaceBSpecify the default method list and apply it to the interfaceCEnable AAADDefine a method list

单选题What is the effect of using the service password-encryption command?()Anly passwords configured after the command has been entered will be encrypted.BOnly the enable password will be encrypted.COnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configuration.EIt will encrypt all current and future passwords.

多选题A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()AErase flash.BRestart the switch.CDelete the VLAN database.DErase the running configuration.EErase the startup configuration.FModify the configuration register.