单选题What is a characteristic of Network Time Protocol?()ANTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.BNTP authentication verifies the source,not the recipient.CNTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.DSecure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.EA stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
单选题
What is a characteristic of Network Time Protocol?()
A
NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.
B
NTP authentication verifies the source,not the recipient.
C
NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D
Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E
A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
参考解析
解析:
暂无解析
相关考题:
You need to decide on which trunking method to implement in the Ezonexam network. What is a characteristic of ISL and 802.1q frame. tagging in a switched LAN environment?A.They are used to find the best path through a network.B.They allow the exchange of filtering tables.C.They specify different implementations of the Spanning-Tree Protocol.D.They allow the exchange of routing tablesE.They provide inter-switch VLAN communication.
The Simple Network Management Protocol(SNMP)is an(66)protocol that facilitates the exchange of management information between(67). It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP)protocol suite. SNMP enables network(68)to manage network performance, find and sole network problems, and plan for(69)An SNMP -managed network consists of three key components: managed devices ,(70),and network -management systems .A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer
You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.
The Testking network has been configured with OSPF as the routing protocol.What is the default administrative distance of the OSPF routing protocol?() A.90B.100C.110D.120E.130F.170G.200
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds
FCAPS is a network maintenance model defined by ISO. What does it stand for?()A、Action ManagementB、Fault ManagementC、Configuration ManagementD、Protocol ManagementE、Security Management
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was originated via a network or aggregate commandD、The network was learned via EBGPE、The network was learned via IBGP
For what two purposes does the Ethernet protocol use physical addresses? ()A、Network A - 172.16.3.48/26B、Network A - 172.16.3.128/25C、Network A - 172.16.3.192/26D、Link A - 172.16.3.0/30E、Link A - 172.16.3.40/30F、Link A - 172.16.3.112/30
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was learned via IBGPD、The network was learned via EBGPE、The network was originated via a network or aggregate command
it is belong a family of ip routing protocols,each router have a partial map of network,what is the routing protocol?
What are three features of voice traffic on a network?()A、burstyB、constantC、bandwidth intensiveD、small packet sizesE、time-sensitiveF、retransmittable
The Testking network has been configured with OSPF as the routing protocol.What is the default administrative distance of the OSPF routing protocol?()A、90B、100C、110D、120E、130F、170G、200
What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()A、They are used to find the best path through a network.B、They allow the exchange of filtering tables.C、They specify different implementations of the Spanning-Tree Protocol.D、They allow the exchange of routing tablesE、They provide inter-switch VLAN communication.
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()A、The network was originated via redistribution of an interior gateway protocol into BGP.B、The network was defined by a static route.C、The network was learned via IBGP.D、The network was learned via EBGP.E、The network was originated via a network or aggregate command.
What is a characteristic of Network Time Protocol?()A、NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.B、NTP authentication verifies the source,not the recipient.C、NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.D、Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.E、A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
A network administrator is viewing the control plane traffic flowing through their network in real-time. What built-in feature enabled this ability?()A、call homeB、wiresharkC、ethanalyzerD、NX-OS
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A、source IP address and the protocol (such as SSL,HTTPS,SSH)B、the packet Time to Live and the source IP addressC、type of service header and DSCP valueD、destination IP address
When tuning a network module what is the purpose of the grace period?()A、It defines the maximum permissible time period between missed heartbeats before a failure is detectedB、It defines the time period to wait to activate the network module after starting the cluster managerC、It defines the period between detecting a missed heartbeat and initiating a network down, allowing thenetwork to stabilizeD、It defines the time period during which, after a network failure was detected, further network failures of thesame type will be ignored
Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()A、MD5 authentication is supported by the Junos OSB、Server mode is not supported by the Junos OSC、The Junos OS can provide a primary time referenceD、The Junos OS does not support the use of a boot server
多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was originated via a network or aggregate commandDThe network was learned via EBGPEThe network was learned via IBGP
多选题What are the three models of quality of service (QoS) in a network?()AResource Reservation Protocol (RSVP)Bfirst-in, first-out (FIFO)Cbest-effortDCBWFQEIntServFDiffServ
单选题The Testking network has been configured with OSPF as the routing protocol.What is the default administrative distance of the OSPF routing protocol?()A90B100C110D120E130F170G200
单选题What must be configured on the Cisco Unity Express host router prior to installation of the CUE module?()ASet up the Network Time Protocol server. BInstall the files needed to run the web-based GUI. CSet up routing and IP addressing on the service module and the interface service engine. DConfigure a session initiation protocol dial peer for connecting calls to the voice mail and Auto Attendant features.
单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()AEnable the highest level of Syslogging available to ensure you log all possible event messagesBUse SSH to access your Syslog informationCLog all messages to the system buffer so that they can be displayed when accessing the routerDSyncronize clocks on the network with a protocol such as Network Time Protocol
问答题it is belong a family of ip routing protocols,each router have a partial map of network,what is the routing protocol?
单选题When tuning a network module what is the purpose of the grace period?()AIt defines the maximum permissible time period between missed heartbeats before a failure is detectedBIt defines the time period to wait to activate the network module after starting the cluster managerCIt defines the period between detecting a missed heartbeat and initiating a network down, allowing thenetwork to stabilizeDIt defines the time period during which, after a network failure was detected, further network failures of thesame type will be ignored
单选题What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment?()AThey are used to find the best path through a network.BThey allow the exchange of filtering tables.CThey specify different implementations of the Spanning-Tree Protocol.DThey allow the exchange of routing tablesEThey provide inter-switch VLAN communication.
多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was learned via IBGPDThe network was learned via EBGPEThe network was originated via a network or aggregate command