A. logging on
B. logging host 10.1.5.5
C. logging console notifications
D. logging trap notifications
您可能感興趣的試卷
你可能感興趣的試題
A. syslog logging
B. console logging
C. buffered logging
D. terminal logging
A. To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B. To improve the IGP convergence time
C. To hide visibility to the core (provider) routers in the MPLS network
D. To provide a visible extension of IP TTL functionality in an MPLS-enabled domain
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
A. A pointer to the address where a RADIUS server can be located
B. A sequential list of user authentication methods
C. A description of what a user can execute on a router
D. The setup for the authentication phase on a router
A. Apply the method list to an interface
B. Specify the default method list and apply it to the interface
C. Enable AAA
D. Define a method list
最新試題
When a Cisco router is configured for SSH, it acts as an ()?
With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()
Which keyword is used with the show ip bgp neighbors [keyword] command to display all routes that are received and accepted from a neighbor?()
What is the most likely reason that an IBGP route that has been selected as a best route is not entered into the IP routing table?()
Refer to the exhibit. You want to minimize the downtime that results from supervisor engine switchovers on Cisco 6500 Series Switches and Cisco 7600 Series Routers. To achieve this, you are considering deploying a Cisco Nonstop Forwarding with Stateful Switchover solution using OSPF.In the exhibit you can see the output of the show ip ospf neighbor detail command.Which trait of systems using Cisco Nonstop Forwarding with Stateful Switchover and OSPF is shown in the exhibit output and will impact your plan?()
On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()
Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()