A.It is a Cisco proprietary protocol.
B.It runs on TCP port 59. .
C.Authentication and authorization are done at different stages.
D.TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E.It is an industry standard protocol.
F.TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
您可能感興趣的試卷
你可能感興趣的試題
A.it is used for load balancing in bidirectional PIM
B.it is used for redundancy in bidirectional PIM
C.it is used for redundancy in PIM-SM
D.it is used for load balancing in PIM-SM
Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()
A. UDLD (UniDirectional Link Detection)
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable
A.Membership Query
B.Membership Report
C.Membership Delay
D.Backward Compatible IGMPv1 Report Message
A.Source Specific Multicast and IGMPv2
B.Announcing multicast sources to BGP speakers
C.Anycast RP
D.Intradomain multicast routing
Refer to the exhibit. Look at the command output. Assume that there is no other path, and the configuration is correct. What would be the consequences of this situation?()
A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.
A.to prevent multicast packets from looping
B.to prevent PIM packets from looping
C.to instruct PIM where to send a (*, G) or (S, G) join message
D.to prevent multicast packets from looping and to instruct PIM where to send a (*, G) or (S, G) joinmessage
A.232.0.0.0/8
B.239.0.0.0/8
C.232.0.0.0/4
D.FF3x::/32
E.FF2x::/32
F.FF3x::/16
Refer to the exhibit. Look at the command output. What would be the most probable reason for this port-ID mismatch?()
A. spanning-tree misconfiguration
B. speed mismatch configuration
C. cabling problem
D. configuration problem
A.PIM-SM
B.PIM-DM
C.PIM-SSM
D.DVMRP
A. Incorrect VTP domain
B. Incorrect VTP password
C. Incorrect VTP mode
D. Incorrect VTP configuration revision
最新試題
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which of these statements about penultimate hop popping are true?()
Which two statements are true about RED?()
How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()
Which of the following is true about the MPLS header and its EXP field size?()
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()
Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()
Which protocol and port have been assigned by IANA for RADIUS authentication?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()