What are the basic configuration steps to enable IS - IS?()A、Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B、Configure the net sy stem - id and the network net - id commands under routerisis.C、Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.D、Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.E、Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

What are the basic configuration steps to enable IS - IS?()

  • A、Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.
  • B、Configure the net sy stem - id and the network net - id commands under routerisis.
  • C、Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.
  • D、Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.
  • E、Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

相关考题:

What are the basic principles of positive error correction?

All ______ is a continuous supply of the basic necessities of life. A what is neededB the things neededC for our needsD that is needed

What will a new Ezonexam router do during startup if a configuration file is not located in NVRAM?A.It will search for the configuration file in the locations specified by boot system commands.B.It will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D.It will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

Click the Exhibit button.In the exhibit, what is the function of the configuration statements?() A. This section is where you define all chassis clustering configuration.B. This configuration is required for members of a chassis cluster to talk to each other.C. You can apply this configuration in the chassis cluster to make configuration easier.D. This section is where unique node configuration is applied.

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?() A. Erase flash.B. Restart the switch.C. Delete the VLAN database.D. Erase the running configuration.E. Erase the startup configuration.F. Modify the configuration register.

What is a benefit of NTLMSSP over basic authentication?() A、 basic cannot be used in transparent proxy modeB、 basic requiresreauthentication with every new domainC、 NTLMSSP is compatible with open LDAPD、 NTLMSSP is more secure than basic

What will a router do during startup if a configuration file is not located in NVRAM?()A、it will search for the configuration file in the locations specified by boot system commands.B、it will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D、it will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

What does the command show | compare rollback 1 display?()A、the difference between the current candidate configuration and the candidate configuration from one commit agoB、the difference etween the current active configuration and the active configuration from the one commit agoC、the difference between the current active configuration and the active configuration from one commit agoD、the difference between the current candidate configuration and the archived configuration from one commit ago

What are three components of a scheduler?()A、Forwarding ClassB、PriorityC、TOS MarkingD、Buffer SizeE、RED Configuration

Your customer requires you to supply a configuration or proposal in xl format.  What tool is available? ()A、IBM Standalone Solutions Configuration Tool (SSCT )B、Server ProvenC、Configuration Options Guide (COG)D、xREF (System X reference)

爱立信OAM的IP地址由哪个脚本定义()。A、Site BasiC.xmlB、Site Equipment.xmlC、Site Installation.xmlD、Site Configuration.xml

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()A、Erase flash.B、Restart the switch.C、Delete the VLAN database.D、Erase the running configuration.E、Erase the startup configuration.F、Modify the configuration register.

When will an "all configuration" backup be imported into the Cisco UCS Manager?()A、 During the initial configuration from the consoleB、 Once the basic configuration has been appliedC、 To restore the configuration on a secondary fabric interconnectD、 To upgrade the firmware on a replacement fabric interconnect

What command will display the network configuration of an Ethernet adapter?()A、lsdevB、lscfgC、entstatD、ifconfig

What IBM pre-sale resource has technical information and general configuration details for System x, BladeCenter, Intellistation, System x storage products and options in both Adobe PDF, and online HTML?()A、ServerProvenB、System x Sales Configuration Aid (xSCA)C、Configuration  Options Guide - (COG)D、Standalone Solutions Configuration Tool (SSCT)

What does the command show | compare rollback 1 display?()A、the difference between the current candidate configuration and the candidate configuration from one commit agoB、the difference between the current active configuration and the current candidate configurationC、the difference between the current active configuration and the active configuration from one commit agoD、the difference between the current candidate configuration and the archived configuration from one commit ago

单选题When will an "all configuration" backup be imported into the Cisco UCS Manager?()A During the initial configuration from the consoleB Once the basic configuration has been appliedC To restore the configuration on a secondary fabric interconnectD To upgrade the firmware on a replacement fabric interconnect

单选题What does the command show | compare rollback 1 display?()Athe difference between the current candidate configuration and the candidate configuration from one commit agoBthe difference between the current active configuration and the current candidate configurationCthe difference between the current active configuration and the active configuration from one commit agoDthe difference between the current candidate configuration and the archived configuration from one commit ago

单选题For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizardthat performs similar configuration functions?()Aaaa configuration commands and the SDM Basic Firewall wizardBsetup exec command and the SDM Security Audit wizardCauto secure exec command and the SDM One-Step Lockdown wizardDCisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN

单选题Click the Exhibit button. In the exhibit, what is the function of the configuration statements?()A This section is where you define all chassis clustering configuration.B This configuration is required for members of a chassis cluster to talk to each other.C You can apply this configuration in the chassis cluster to make configuration easier.D This section is where unique node configuration is applied.

单选题What is the name of the file that is used to provide the configuration setting in unattended mode?()AAnswer file.BStartup file.CUnattended configuration file.DNetwork file.

单选题What does the command show | compare rollback 1 display?()Athe difference between the current candidate configuration and the candidate configuration from one commit agoBthe difference etween the current active configuration and the active configuration from the one commit agoCthe difference between the current active configuration and the active configuration from one commit agoDthe difference between the current candidate configuration and the archived configuration from one commit ago

单选题You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()AGPT disks and basic disksBGPT disks and dynamic disksCMBR disks and basic disksDMBR disks and dynamic disks

单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()AUse the transport security mode and specify None for transport client credential type.BUse the transportWithMessageCredential security mode and specify Basic for the transport client credential type.CUse the message security mode and specify Basic for the transport client credential type.DUse the transportWithMessageCredential security mode and specify None for the transport client credential type.

单选题What is a benefit of NTLMSSP over basic authentication?()A basic cannot be used in transparent proxy modeB basic requiresreauthentication with every new domainC NTLMSSP is compatible with open LDAPD NTLMSSP is more secure than basic

多选题What are three components of a scheduler?()AForwarding ClassBPriorityCTOS MarkingDBuffer SizeERED Configuration

单选题What we need in life is divided into _____ according to this article.Athe basic necessities and luxuryBmany kinds of need such as food, clothing and housesCfour groups, namely, the basic necessities, luxury, reliable income and future expenseDthe basic necessities and reliable income

多选题A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()AErase flash.BRestart the switch.CDelete the VLAN database.DErase the running configuration.EErase the startup configuration.FModify the configuration register.