单选题What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()ANothing, wide metrics are used by default in IS-ISBEnable wide-metrics-only under protocol IS-ISCEnable traffic-engineering under protocols IS-ISDDisable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).
单选题
What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()
A
Nothing, wide metrics are used by default in IS-IS
B
Enable wide-metrics-only under protocol IS-IS
C
Enable traffic-engineering under protocols IS-IS
D
Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).
参考解析
解析:
暂无解析
相关考题:
By default, which IS-IS metric types does JUNOS software support?() A. receiving of wide metrics onlyB. sending of narrow metrics onlyC. receiving of narrow metrics onlyD. sending and receiving of narrow and wide metrics
What are two commands that can be used to configure MBGP for multicast?() A. Under the BGP group, configure family inet any.B. Use the set protocol MBGP command to enable MBGP.C. Under the BGP group, configure family inet multicast.D. Use the set rib-group command to copy the multicast routes into inet.1.
In JUNOS software, which command is used to configure TED support for OSPF?() A. set protocols rsvp cspf-enableB. set protocols mpls cspf-enableC. set protocols rsvp traffic-engineeringD. set protocols ospf traffic-engineering
What are the basic configuration steps to enable IS - IS?() A. Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B. Configure the net sy stem - id and the network net - id commands under routerisis.C. Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.D. Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.E. Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A、aaa authentication enable method defaultB、aaa authentication enable defaultC、aaa authentication enable levelD、aaa authentication enable default local
What is the purpose of an explicit "deny any" statement at the end of an ACL?()A、none,since it is implicitB、to enable Cisco IOS IPS to work properly;however,it is the deny all traffic entry that is actually requiredC、to enable Cisco IOS Firewall to work properly;however,it is the deny all traffic entry that is actually requiredD、to allow the log option to be used to log any matchesE、to prevent sync flood attacksF、to prevent half-opened TCP connections
Examine the following options ,when editing global IPS settings, which one determines if the IOS- basedIPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for thatengine is being compiled?()A、Enable Signature DefaultB、Enable Engine Fail ClosedC、Enable Default IOS Signature ActualTests.comD、Enable Fail Opened
The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1
What protocol is used for Path Setup in MPLS traffic engineering?()A、OSPFB、ISISC、BGPD、RSVPE、PIM
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used
By default, which IS-IS metric types does JUNOS software support?()A、receiving of wide metrics onlyB、sending of narrow metrics onlyC、receiving of narrow metrics onlyD、sending and receiving of narrow and wide metrics
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet any.B、Use the set protocol MBGP command to enable MBGP.C、Under the BGP group, configure family inet multicast.D、Use the set rib-group command to copy the multicast routes into inet.1.
What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A、No action required, wide metrics are used by default in IS-IS.B、Enable wide-metrics-only under protocols IS-IS.C、Enable traffic-engineering under protocols IS-IS.D、Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).
In JUNOS software, which command is used to configure TED support for OSPF?()A、set protocols rsvp cspf-enableB、set protocols mpls cspf-enableC、set protocols rsvp traffic-engineeringD、set protocols ospf traffic-engineering
What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A、Nothing, wide metrics are used by default in IS-ISB、Enable wide-metrics-only under protocol IS-ISC、Enable traffic-engineering under protocols IS-ISD、Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local
单选题What is the purpose of an explicit "deny any" statement at the end of an ACL?()Anone,since it is implicitBto enable Cisco IOS IPS to work properly;however,it is the deny all traffic entry that is actually requiredCto enable Cisco IOS Firewall to work properly;however,it is the deny all traffic entry that is actually requiredDto allow the log option to be used to log any matchesEto prevent sync flood attacksFto prevent half-opened TCP connections
单选题By default, which IS-IS metric types does JUNOS software support?()Areceiving of wide metrics onlyBsending of narrow metrics onlyCreceiving of narrow metrics onlyDsending and receiving of narrow and wide metrics
单选题What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()ANothing, wide metrics are used by default in IS-ISBEnable wide-metrics-only under protocol IS-ISCEnable traffic-engineering under protocols IS-ISDDisable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).
单选题You need to design a method to enable remote encryption on Server5. What should you do?()AConfigure the editor’s user account properties to enable Store password using reversible encryptionBConfigure the editor’s user account properties to enable Use DES encryption for this accountCConfigure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyDConfigure the Server5 computer account properties to enable Trust computer for delegation
单选题In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()AIf the radius server returns an error, the enable password will be usedBIf the radius server returns a ’failed’ message, the enable password will be usedCThe command login authentication group will associate the AM authentication to a specifiedinterfaceDIf the group database is unavailable, the radius server will be used
单选题What are the basic configuration steps to enable IS - IS?()AConfigure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.BConfigure the net sy stem - id and the network net - id commands under routerisis.CConfigure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.DConfigure the network net - id command(s) and the is - type level -1- 2 command under routerisis.EConfigure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
单选题What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()ANo action required, wide metrics are used by default in IS-IS.BEnable wide-metrics-only under protocols IS-IS.CEnable traffic-engineering under protocols IS-IS.DDisable TLVs 2 and 128 which carry the 6-bit metrics (0-63).
单选题In JUNOS software, which command is used to configure TED support for OSPF?()Aset protocols rsvp cspf-enableBset protocols mpls cspf-enableCset protocols rsvp traffic-engineeringDset protocols ospf traffic-engineering
单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()AThe enable password is present for backward compatibility.BBecause the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.CThe enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.DThe enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.