The following commands are issued on a Cisco router:
What would be the output shown on the console?()
A.All IP packets passing through the router
B.Only IP packets with the source address of 10.1.1.1
C.All IP packets from 10.1.1.1 to 172.16.1.1
D.All IP packets between 10.1.1.1 to 172.16.1.1
您可能感興趣的試卷
你可能感興趣的試題
A.Firefighting
B.Interrupt-driven
C.Policy-based
D.Structured
E.Foundational
A.warnings only
B.warnings, notifications, error, debugging, informational
C.warnings, errors, critical, alerts, emergencies
D.notifications, warnings, errors
E.warnings, errors, critical, alerts
A.Action Management
B.Fault Management
C.Configuration Management
D.Protocol Management
E.Security Management
最新試題
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.