-
When configuring cisco secure acs to support wireless eap authentication,which device must be configured as a aaa client?()
A . location appliance
B . controller-based access points
C . wireless clients
D . wireless control system
E . wireless controller
-
Which of these is mandatory when configuring Cisco IOS Firewall? ()
A . Cisco IOS IPS enabled on the untrusted interface
B . NBAR enabled to perform protocol discovery and deep packet inspection
C . a route map to define the trusted outgoing traffic
D . a route map to define the application inspection rules
E . an inbound extended ACL applied to the untrusted interface
-
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()
A . In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B . In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C . In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D . In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
-
When configuring Frame Relay using point-to-point subinterfaces, which of the following must not be configured?()
A . The local DLCI on each subinterface of the Frame Relay.
B . The Frame Relay encapsulation on the physical interface.
C . An IP address on the physical interface.
D . The subinterface type as point-to-point
-
What OSPF command, when configured, will include all interfaces into area 0?()
A . network 0.0.0.0 255.255.255.255 area 0
B . network 0.0.0.0 0.0.0.0 area 0
C . network 255.255.255.255 0.0.0.0 area 0
D . network all-interfaces area 0
-
When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()
A . The period of time in which virtual login attempts are blocked, following repeated failed login attempts
B . The period of time in which virtual logins are blocked as security services fully initialize
C . A period of time when no one is attempting tolog in
D . The period of time between successive login attempt
-
When configuring a serial interface on a router, what is the default encapsulation?()
A . atm-dxi
B . frame-relay
C . hdlc
D . lapb
E .
-
How many VLANs on the UCS must be configured when using FCoE?()
A . One per blade
B . One per VSAN
C . One per fabric
D . None are required
-
When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()
A . A start
B . A ring
C . A target mode fc
D . A target mode scsi
-
When a Cisco router is configured for SSH, it acts as an ()?
A . SSH client
B . SSH proxy
C . SSH server
D . SSH and SSL server
-
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A . Wireless Control System
B . wireless clients
C . wireless controllers
D . controller-based access points
E . Location Appliance
-
When configuring private VLANs, which configuration task must you do first?()
A . Configure the private VLAN port parameters.
B . Configure and map the secondary VLAN to the primary VLAN.
C . Disable IGMP snooping.
D . Set the VTP mode to transparent.
-
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()
A . TCP/IP
B . Multiprotocol
C . Named Pipes
D . NWLink IPX/SPX
-
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
A . Voice Traffic uses Assured Forwarding
B . Voice Signaling traffic uses Assured Forwarding
C . Voice Signaling traffic uses priority queuing
D . Voice Traffic uses priority queuing
E . Voice signaling traffic should use priority queuing with Assured Forwarding
-
When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()
A . Any matching state condition will result with the state being triggered
B . Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to trigger
C . All specified state conditions are used as part of the requirements tobe met to for the state to trigger
D . Once the state conditions are met, they become persistent and can only be removed using the Reset feature
-
Which two of these elements need to be configured prior to enabling SSH? ()
A . hostname
B . loopback address
C . default gateway
D . domain name
E . SSH peer addre
-
When will an "all configuration" backup be imported into the Cisco UCS Manager?()
A . During the initial configuration from the console
B . Once the basic configuration has been applied
C . To restore the configuration on a secondary fabric interconnect
D . To upgrade the firmware on a replacement fabric interconnect
-
Which two of these elements need to be configured prior to enabling SSH?()
A . hostname
B . loopback address
C . default gateway
D . domain name
E . SSH peer addre
-
Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
A . A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
B . An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
C . Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
D . Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
E . The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
F . The SDM provides a basic, intermediate, and advanced firewall wizard.
-
When configuring unified ports on a 5548 switch, which port ordering must be respected?()
A . Fibre Channel ports must be configured from the first port in the module.
B . Ethernet ports must be configured from the last port in the module.
C . Fibre Channel ports must be configured from the last port in the module.
D . Ethernet ports must be configured from the first port in the module.
-
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
A . Interfaces and Connections
B . Intrusion Prevention
C . Security Audit
D . Additional Task
-
When configuring pseudo wire for E1 service on ZXCTN equipment, make sure ()and contro
When configuring pseudo wire for E1 service on ZXCTN equipment, make sure ()and control field must be selected.
-
使用SSH对ASCU单盘配置IP命令为configure.sh –n node1 -i 2 -a,则此ASCU的ip为()
A.10.18.1.8
B.10.18.1.10
C.10.18.1.9
D.10.18.2.8
-
Which does not need to be configured on ZXCTN6100 when performing basic configuration
A.A.UNI interface configuratio
B.B.Static MAC configuratio
C.C.configuratio
D.D.VLAN interface configuratio