單項(xiàng)選擇題Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()

A.Pings are allowed only to specific devices.
B.CDP information is not exchanged.
C.Port scans can no longer be run.
D.Some network diagnostic data is lost.
E.Wireless devices need to be physically connected to the edge device.
F.OSPF routing needs the command ip ospf network non-broadcast enabled.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What are the four fields in an MPLS label?()

A.version
B.experimental
C.label
D.protocol
E.TTL
F.bottom-of-stack indicato

2.多項(xiàng)選擇題Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()

A.A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
B.An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
C.Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
D.Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
E.The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
F.The SDM provides a basic, intermediate, and advanced firewall wizard.

4.多項(xiàng)選擇題

Refer to the exhibit.

Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()

A.The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B.The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C.The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D.The tunnel mode gre command must be configured on the Tunnel0 interface.
E.The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F.The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.

5.多項(xiàng)選擇題What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()

A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction

6.多項(xiàng)選擇題Which two statements are true about broadband cable (HFC) systems?()

A.Cable modems only operate at Layer 1 of the OSI model.
B.Cable modems operate at Layers 1 and 2 of the OSI model.
C.Cable modems operate at Layers 1, 2, and 3 of the OSI model.
D.A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.
E.A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.

7.多項(xiàng)選擇題Which two mechanisms can be used to detect IPsec GRE tunnel failures?()

A.Dead Peer Detection (DPD)
B.CDP
C.isakmp keepalives
D.GRE keepalive mechanism
E.The hello mechanism of the routing protocol across the IPsec tunnel

8.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()

A.The route-target both 100:2 command sets import and export route-targets for vrf2.
B.The route-target both 100:2 command changes a VPNv4 route to a IPv4 route.
C.The route-target import 100:1 command sets import route-targets routes specified by the route map.
D.The route-target import 100:1 command sets import route-targets for vrf2 that override the other route-target configuration.

9.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()

A.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed without going through the encrypted tunnel.
B.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed through the encrypted tunnel.
C.Any protected subnets that are entered represent subnets at the VPN server site that will be accessed without going through the encrypted tunnel.
D.Any protected subnets that are entered represent subnets at the VPN server site that will be accessedthrough the encrypted tunnel.

10.多項(xiàng)選擇題Which two statements about the Cisco AutoSecure feature are true?()

A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

最新試題

Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()

題型:單項(xiàng)選擇題

Which three statements about IOS Firewall configurations are true?()

題型:多項(xiàng)選擇題

Which three categories of signatures can a Cisco IPS microengine identify?()

題型:多項(xiàng)選擇題

What are two steps that must be taken when mitigating a worm attack?()

題型:多項(xiàng)選擇題

What is a reason for implementing MPLS in a network?()

題型:單項(xiàng)選擇題

Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()

題型:單項(xiàng)選擇題

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

題型:單項(xiàng)選擇題

Which form of DSL technology is typically used as a replacement for T1 lines?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()

題型:單項(xiàng)選擇題

Which three MPLS statements are true?()

題型:多項(xiàng)選擇題