更多"Which two statements apply when a u"的相关试题:
[多项选择]Which two statements apply when a user has entered private configuration mode by typing configure private?()
A. All users have their own active configuration.
B. All users have their own private candidate configuration.
C. When a user commits, all nonconflicting changes made by all users are committed.
D. When a user commits, only the user's own changes are committed.
[多项选择]Which two states are the port states when RSTP has converged?()
A. blocking
B. learning
C. discarding
D. forwarding
E. listening
[多项选择]Which two statements apply to dynamic access lists?()
A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.
[多项选择]Which two statements apply to policy scheduling?() (Choose two.)
A. An individual policy can have only one scheduler applied.
B. You must manually configure system-time updates.
C. Multiple policies can use the same scheduler.
D. Policies that do not have schedulers are not active.
[多项选择]Which two commands are needed to create and apply an export policy that advertises static routes to OSPF neighbors?()
A. edit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then accept
B. edit ospf policy set from protocol static set 1 then accept
C. set protocols OSPF export policy-name
D. set protocols OSPF policy policy-name
[多项选择]Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
[多项选择]Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()
A. Configure a non-unique address on the loopback interface for use by the PIM RP.
B. Configure MSDP with the unique address (router ID) as the local address of the peer.
C. Configure MSDP with the non-unique address (router ID) as the local address of the peer.
D. Configure a unique address on the loopback interface, used as the PIM RP.
[多项选择]Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)
A. regular upgrade process
B. multivendor support
C. cost savings
D. product variety
E. well-tested interoperability
[多项选择]What are three key concepts that apply when configuring the EIGRP stub routing feature in a hub and spoke network?()
A. A hub router prevents routes from being advertised to the remote router.
B. Only remote routers are configured as stubs.
C. Stub routers are not queried for routes.
D. Spoke routers connected to hub routers answer the route queries for the stub router.
E. A stub router should have only EIGRP hub routers as neighbors.
F. EIGRP stub routing should be used on hub routers only.
[多项选择]Which two are correct when configuring an IP address for a Fast Ethernet interface?()
A. set interfaces fe-0/0/0 address 10.1.1.1/24
B. set interfaces fe-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces fe-0/0/0.0 address 10.1.1.1/24
D. set interfaces fe-0/0/0 unit 0 family inet address 10.1.1.1/24
[多项选择]Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()
A. set protocols rip export demo
B. edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept
C. edit policy-options policy-statement demo set term 1 from protocol static accept
D. set protocols rip group internal export demo