A.User authentication ID and password B.User profile C.Output of debug D.Output of show interface E.Result of ping F.Output of show process cpu
多项选择题Whichofthefollowingarecommonissuesthatshouldbeconsideredwhenestablishingortroubleshootingsite-to-siteVPNs?(Chooseallthatapply.)()
A.User authentication B.Overlapping IP address space C.GRE or IPsec configuration D.MTU size E.VPN client software F.Authentication server configured ly
多项选择题WhichofthefollowingareTACACS+characteristics?(Chooseallthatapply.)()
A.Cisco proprietary B.Standards-based protocol C.Provides separate services for authentication, authorization, and accounting D.Encrypts only the password E.Uses UDP for a transport layer F.Encrypts the entire packet
单项选择题Whichofthefollowingcommandswillremovealldynamicentriesforarouter’sNATtable?()
A.clear nat translations B.clear ip nat translations* C.clear ip nat statistics D.clear ip nat transactions* E.clear ip nat translations F.clear ip nat translations all
多项选择题Whichofthefollowingarecorrectstatements?()
A.EIGRP advertises the best routes to its neighbor B.EIGRP uses "cost" to determine best path C.EIGRP allows unequal cost load balancing D.OSPF requires neighbor adjacencies before updates are sent E.EIGRP advertises all routes to its neighbor F.OSPF allows unequal cost load balancing
多项选择题Whichofthefollowingarebyproductsofastructuredmaintenanceplan?(Chooseallthatapply.)()
A.Predictable security vulnerabilities B.Economies of scale C.Improved expenditure forecasts D.Increased downtime E.Predictable equipment obsolescence F.Consumption of fewer resources