The relevant configuration files for the TestKing1 and TestKing2 routers are displayed below:With due consideration to the command outputs, which of the following reasons would you attribute the connectivity problem between the two routers?()A. The authentication needs to be changed to PAP for both routers.B. The serial IP addresses of routers are not on the same subnet.C. The username/password combination is incorrectly configured.D. The router names are incorrectly configured.

The relevant configuration files for the TestKing1 and TestKing2 routers are displayed below:With due consideration to the command outputs, which of the following reasons would you attribute the connectivity problem between the two routers?()

A. The authentication needs to be changed to PAP for both routers.

B. The serial IP addresses of routers are not on the same subnet.

C. The username/password combination is incorrectly configured.

D. The router names are incorrectly configured.


相关考题:

在证据理论中,信任函数与似然函数的关系为 A.Bel(A)≤Pl(A)B.Bel(A)C.Bel(A)≥Pl(A)D.Bel(A)>Pl(A)

You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()A. Internal routers within the backbone area (area 0)B. Internal routers within the NSSAsC. Internal routers within the stubby areasD. ASBRsE. ABRsF. DRs and BDRs

Refer to the exhibit. IP multicast configuration changes have been made on several routers.However, the IP multicast table displayed in the exhibit still does not reflect the changes. What should be done to display the new routing table information? ()A. Issue the clear ip route * privileged EXEC command.B. Issue the clear ip igmp group privileged EXEC command.C. Issue the no ip mroute - cache privileged EXEC command.D. Issue the clear ip mroute privileged EXEC command.

There is a connectivity problem between the serial 0/0 interface of router TESTKING1 and the serial 0/0 interface of TESTKING2. A leased line point to point circuit is installed between these two routers. The output from the show interface serial 0/0 command is displayed below for each of these routers:From your observations of the above exhibit, what is the underlying cause of the problem?()A. The loopback is not set.B. The serial cable is faulty.C. The subnet mask is not configured properly.D. The IP address is not configured properly.E. The Layer 2 frame types are not compatible.F. The keepalive setting is not configured properly.

Part of the configuration files for routers testking1 and testking2 are displayed below:If you were to enter the show interface serial 0 command on router testking1,which of the following will be displayed?()A. Serial 0 is down, line protocol is downB. Serial 0 is up, line protocol is upC. Open: IPCP, CDPCPD. LCP closedE. LCP open

You are a network technician at TestKing, Inc. You are currently troubleshooting a routing issue on the Testking1 router. You issue the show ip route command. The output from the command is displayed in the following exhibit:Which one of the following routes WILL NOT be entered into its neighboring routers routing table?()A. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1B. C 192.168.1.0/24 is directly connected, Ethernet0C. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0E. None of the above

You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()A. Link state routing protocol is missing.B. Incorrectly configured IP addressesC. IGRP is incorrectly configured.D. Frame relay is not configured.E. None of the above

( ) is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project.A、Integrated managementB、Configuration managementC、Scope managementD、Requirements management

The routers named Testking1 and Testking2 are both configured with RIP only.What will happen in the event of Testking1 receiving a routing update that contains a higher cost path to a network already in its routing table?()A、The update information will be added to the existing routing table.B、The update information will replace the existing routing table entry.C、The update will be ignored and thus no further action will occur.D、The existing routing table entry will be purged from the routing table and all routers will attempt convergence.

What are four uses of the USB ports in the Cisco integrated services routers?()A、Secure Device AuthenticationB、Remote AdministrationC、Bulk Flash storageD、Secure Configuration Files DistributionE、Storage of Removable CredentialsF、Increase RAM Memory for the Router

You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()A、Internal routers within the backbone area (area 0)B、Internal routers within the NSSAsC、Internal routers within the stubby areasD、ASBRsE、ABRsF、DRs and BDRs

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()A、CiscoWorks VPN Manager B、deploy Linksys routers with menu-driven configurationC、Easy VPN client mode D、disable 802.1x and Auth Proxy on the Teleworker router

Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.)A、IGP routes advertised by P routersB、IGP routes advertised by PE routersC、VPN routes advertised by PE routersD、VPN routes advertised by CE routers

Which three initial configuration methods are supported on J-series routers?()A、CLIB、J-WebC、JUNOScopeD、autoinstallationE、PCMCIA flash card

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

多选题Which three initial configuration methods are supported on J-series routers?()ACLIBJ-WebCJUNOScopeDautoinstallationEPCMCIA flash card

多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

单选题After making some network changes you power off and then power on your Cisco router. What sequence of events occurs when a router is powered up?()APerform POST, locate configuration statements, apply configuration statements, locate Cisco IOS software, and load Cisco IOS software.BLocate Cisco IOS software, load Cisco IOS software, locate configuration statements, apply configuration statements, and perform POST.CTest software routines, POST, load configuration files, load Cisco IOS software, test Cisco IOS software.DPOST, locate Cisco IOS software, load the Cisco IOS software, locate configuration statements, and apply configuration statements.ELoad and test IOS, load configuration files, test software routines, POST.

单选题The routers named Testking1 and Testking2 are both configured with RIP only.What will happen in the event of Testking1 receiving a routing update that contains a higher cost path to a network already in its routing table?()AThe update information will be added to the existing routing table.BThe update information will replace the existing routing table entry.CThe update will be ignored and thus no further action will occur.DThe existing routing table entry will be purged from the routing table and all routers will attempt convergence.

单选题You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()AInternal routers within the backbone area (area 0)BInternal routers within the NSSAsCInternal routers within the stubby areasDASBRsEABRsFDRs and BDRs

单选题You are the network administrator for All network servers run Windows 2003 Server, and all client computers run Windows XP Professional. A shared folder named Sales resides on an NTFS volume on one of your servers. Sales contains two subfolders named TESTKING1 and TESTKING2. Files and folders in these two subfolders were created by various users with varying NTFS permissions. You need to move some of the files and folders from TESTKING1 to TESTKING2. You must retain the existing file permissions, and you must accomplish your goal by using the minimum amount of administrative effort. Which action or actions should you perform?() (Choose all that apply)AMove the files and folders from TESTKING1 to TESTKING2.BCopy the files and folders from TESTKING1 to TESTKING2.CChange the NTFS permissions on TESTKING2 to match the NTFS permissions on TESTKING1.DBack up the files and folders in TESTKING1 and restore them, including permissions, to TESTKING2.

多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card

多选题What are four uses of the USB ports in the Cisco integrated services routers?()ASecure Device AuthenticationBRemote AdministrationCBulk Flash storageDSecure Configuration Files DistributionEStorage of Removable CredentialsFIncrease RAM Memory for the Router

单选题You are the network administrator for TestKing. The network contains a Windows Server 2003 computer named testking1, which hosts a critical business application named Salesapp. Testking1 has one disk that contains a single NTFS volume. Five days ago, the System State of testking1 was backed up, and an Automated System Recovery (ASR) backup was created. No additional backups were performed. Subsequently, many changes were made to the Salesapp data files. You apply an update to the application, which requires you to restart testking1. Windows startup terminates with a Stop error. You restart the computer and boot to a floppy disk. A utility on this disk gives you read-only access to the NTFS file system. You discover that one of the .dll files for the Salesapp application is corrupted. The corrupted file is stored in the C./Windows/System32 folder. You need to restore the corrupted file. You need to avoid losing any changes made to the data files on testking1. What should you do onTestKing1?()APerform the ASR restore procedure.BRestart Windows by using the Last Known Good configuration option.CStart the Recovery Console and replace the corrupted .dll file with a copy from the Salesapp CD-ROM.DReinstall Windows Server 2003. Do not format any volumes.

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()AComputer Configuration/Software Settings/Software InstallationBUser Configuration/Software Settings/Software InstallationCComputer Configuration/Administrative Templates/Windows Components/Windows InstallerDUser Configuration/Administrative Templates/Windows Components/Windows InstallerEComputer Configuration/Administrative Templates/Windows Components/Windows UpdateFUser Configuration/Administrative Templates/Windows Components/Windows Update

多选题Which three statements best describe HSRP configuration on Cisco Nexus switches?()AIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.BIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.CYou can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.DYou can use the show standby command to verify HSRP operation and configuration.EIf you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

单选题Which interface is used to configure debug parameters for log files?()ADatastore Control Center  BAlarm and Trace Configuration  CCustom File Configuration  DControl Center