更多"Which two signaling protocols could"的相关试题:
[多项选择]Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()
A. The i nterface used by one router to connect to the other router is passive in the EIGRP process.
B. Duplicate EIGRP router IDs.
C. Mismatched Hold Timers.
D. IP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.
[单项选择]Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A. BIOS password
B. Domain membership
C. EFS
D. Bitlocker
[单项选择]Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()
A. RAID array management
B. CHKDSK
C. Monitoring agents
D. Partitioning management
[多项选择]Which two commands are used during the password recovery process?()
A. clear system login
B. boot -s
C. recovery
D. delete system root-authentication
[多项选择]Which two values are used by Spanning Tree Protocol to elect a root bridge?()
A. amount of RAM
B. bridge priority
C. IOS version
D. IP address
E. MAC address
F. speed of the links
[单项选择]Which of the following could BEST be used to recover a failed RAID 1 disk after it has been replaced?()
A. Tape restore utilities
B. Imaging utilities
C. Partitioning utilities
D. Array management utilities
[多项选择]Which two commands may be used when configuring an IP address for a Gigabit Ethernet interface?()
A. set interfaces ge-0/0/0.0 address 10.1.1.1/24
B. set interfaces ge-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24
D. set interfaces ge-0/0/0 address 10.1.1.1/24
[多项选择]Which two link protocols are used to carry multiple VLANs over a single link?()
A. VTP
B. 802.1q
C. IGP
D. ISL
E. 802.3u
[多项选择]Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
A. SSH
B. Telnet
C. WebView
D. device front panel
E. serial console (command-line interface)
[多项选择]Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
[多项选择]Which two methods are used to assign a route-distinguisher in a Kompella Layer 2 VPN?()
A. by assigning the RD under the routing-instances
B. by assigning the RD under protocols bgp
C. by assigning the RD under routing-options
D. by assing the RD under policy-options
[多项选择]Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()
A. set protocols rip export demo
B. edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept
C. edit policy-options policy-statement demo set term 1 from protocol static
D. set policy-options policy-statement demo