题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-21 10:36:22

[单项选择]A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? ()
A. in global configuration mode, apply the service policy and use the qos pre-classify
B. in global configuration mode, apply the service policy but do not use the qos pre-classify command
C. apply the service policy on the physical interface but do not use the qos pre-classify
D. apply the service policy on the tunnel interface but do not use the qos pre-classify command 
E. apply the service policy on the tunnel interface and use the qos pre-classify command

更多"A GRE tunnel is&#"的相关试题:

[多项选择]A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()
A. Router# ping 192.168.13.26
B. Router# debug access-list 172
C. Router# show open ports 192.168.13.26
D. Router# show access-list
E. Router# show ip interface
[多项选择]Which two statements about an interface configured with the asr-group command are correct?()
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
[多项选择] A general purpose MySQL instance is configured with the following options: —log-slow-queries —long-query-time=,0001 —log-slow-admin-queries —general-log —log-bin —binlog-format=STATEMENT —innodb-flush-log-at-trx-commit=1 Which three statements are true()。
A. The General Query Log records more data than the Binary Log
B. The binary Log records more data than the General Query Log
C. The Slow Query Log records more data than the General Query Log
D. The General Query Log records more data than the Slow Query Log
E. The Slow Query Log records more data than the Binary Log
F. The Binary Log records more data than the Slow Query Log
[多项选择]You have configured a Classifier Access Control List(CLACL)with multiple match clauses.Each match clause has multiple defined fields within it.Which two statements describe how the router evaluates this CLACL?()
A. All fields in each match clause must match.
B. All match clauses in the CLACL must match.
C. Only asingle field in each match clause must match.
D. Only asingle match clause in the CLACL must match
[单项选择]The Testking network has been configured with OSPF as the routing protocol.What is the default administrative distance of the OSPF routing protocol?()
A. 90
B. 100
C. 110
D. 120
E. 130
F. 170
G. 200
[单项选择]You have configured your chassis cluster to include redundancy group 1. Node 0 is configured to be the primary node for this redundancy group. You need to verify that the redundancy group failover is successful.Which command do you use to manually test the failover?()
A. request chassis cluster manual failover group 1 node 1
B. request cluster failover redundancy-group 1 node 1
C. request chassis cluster manual failover redundancy-group 1 node 1
D. request chassis cluster failover redundancy-group 1 node 1
[多项选择]Which two static routes are typically configured on your router when a Routed 1483 network is grouping ATM PVCs into alarge subnet?()
A. host route
B. default route
C. customer network
D. ISP’s routing domain
[单项选择] A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()
A. The user lab will not be able to login.
B. The user lab will be authenticated against the local database and will be able to login.
C. The user will be able to login only if tries to login as the root user.
D. The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.
[多项选择]Which two parameters are configured in IPsec policy? ()(Choose two.)
A. mode
B. IKE gateway
C. security proposal
D. Perfect Forward Secrecy
[单项选择]Which of the following devices could be configured as a DHCP server?()
A. Wireless router
B. Unmanaged switch
C. Hub
D. Repeater
[单项选择] A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
A. The host needs to open the telnet port.
B. The host needs a route for the translated address.
C. The administrator must use a proxy-arp policy for the translated address.
D. The administrator must use a security policy, which will allow communication between the zones.
[单项选择]You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
A. The user will be instructed to call the network administrator.
B. The user will fail authentication.
C. The user will be prompted to install a new device certificate on the MAG Series device.
D. The user will successfully authenticate and have full network access.
[多项选择]The database is configured in ARCHIVELOG mode and regular complete database backups are taken. Theloss of which two types of files may require a recovery with the RESETLOGS option? ()(Choose two)
A. Control files
B. Password files
C. Inactive online redo log file
D. Archived log files required to perform recovery
E. Newly created tablespace which is not backed up
[单项选择]When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()
A. Bus
B. Mesh
C. Multipath
D. Ring
[多项选择]Some of the TestKing routers have been configured with default routes. What are some of the advantages of using default routes?()
A. They establish routes that will never go down.
B. The keep routing tables small.
C. They require a great deal of CPU power.
D. The allow connectivity to remote networks that are not in the routing table.
E. They direct traffic from the Internet into corporate networks.
[单项选择]Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()
A. From the Static Routes node, configure a static route.
B. From the server properties, configure SSL Certificate Binding.
C. From the NAT interface, add an address pool and a reservation.
D. From the NAT interface, configure the Secure Web Server (HTTPS) service.
[单项选择]What happens when Host Checker is configured to perform checks every "0" minutes? ()
A. Host Checker is disabled.
B. Host Checker will perform continous checks.
C. Host Checker will perform checks when user logs out.
D. Host Checker will perform checks when user first logs in.
[单项选择]What must be configured prior to the first commit after factory defaults are loaded?()
A. root authentication
B. default gateway
C. hostname
D. management services
[单项选择] Router R1 has been configured with the redistribute ospf 1 route - map fred command under router eigrp 1. The route map named fred needs to be configured to match routes to d etermine which routes are redistributed into EIGRP. Which of the following answers lists an item that cannot be matched by route map fred?()
A. Subnet number
B. Next - hop router IP address of the route
C. Whether the route is an E1 or E2 route
D. The ro ute's tag
E. The number of router hops between the router and the subnet
[多项选择]You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()
A. Packets within the 10.0.0.0/24 subnet will be accepted.
B. Packets within the 10.0.0.0/24 subnet will be rejected.
C. Packets within the 10.0.0.0/24 subnet will be counted.
D. Packets within the 10.0.0.0/24 subnet will not be counted.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码