A.Following the traffic path B.Top-down C.Comparing configurations D.Bottom-up E.Divide and conquer F.Examine SLAs
单项选择题WhichofthefollowingtopologysituationswouldbeaqoodcandidateforconfiguringDMVPN?()
A.Extranet VPN B.Managed overlay VPN topology C.Hub-and-spoke VPN topology D.Central-site VPN topology E.Full mesh VPN topology F.Remote-access VPN topology
多项选择题WhichofthefollowingisnotanessentialprerequisiteforAutoQoStobecorrectlyappliedtoaninterface?(Chooseallthatapply.)()
A.The interface must be configured as a Multilink PPP interface B.The correct bandwidth should be configured on the interface C.A QoS policy must not be currently attached to the interface D.CEF must be enabled E.AutoQoS must be enabled globally before it can be enabled on the interface F.An IP address must be configured on the interface if its speed is equal to or less than 768 kbps
多项选择题Whichofthefollowingarevalidmodesofaccessingthedataplane?(Chooseallthatapply.)()
A.Serial connection B.Secure Shell C.RADIUS D.Simple Network Management Protocol E.HTTP F.Telnet
多项选择题WhichofthefollowingcharacteristicsdescribetheBPDUGuardfeature?(Chooseallthatapply.)()
A.A BPDU Guard port should only be configured on ports with PortFast enabled B.BPDU Guard and PortFast should not be enabled on the same port. C.BPDU Guard is used to ensure that superior BPDUs are not received on a switch port D.A BPDU Guard port receiving a BPDU will go into err-disable state E.A BPDU Guard port receiving a BPDU will be disabled F.BPDU Guard can be enabled on any switch port
单项选择题AMACaddressfloodattackisoccurringontheLAN.Duringthisattack,numerousframesareforwardedtoaswitchwhichcausestheCAMtabletofilltocapacity.Howdoesthisactionbenefittheattacker?()
A.All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable B.Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns C.All traffic is redirected to the VLAN that the attacker used to flood the CAM table D.All traffic is flooded out all ports and an attacker is able to capture all data E.None of the other alternatives apply