Based on the configuration shown in the exhibit, what will happen to the traffic matching the securitypolicy?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/704fc9c0bf245b262abb1fe3ed2d7849.jpg' />
A. The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.
B. The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.
C. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
D. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.
时间:2024-01-16 12:45:24
-
When configuring role-based CLI on a Cisco router,which action will be taken first ?()
A . Create a parser view called "root view."
B . Log in to the router as the root user.
C . Enable the root view on the router.
D . Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
-
Refer to the exhibit. Based on this configuration, what type of marker is achieved?()https://assets.asklib.com/images/image2/2018072409374852583.jpg
A . Single-rate, two-color marker
B . Three-rate, two-color marker
C . Two-rate, three-color marker
D . Single-rate, three-color marker
-
The configuration of the online redo log files is as follows:
https://assets.asklib.com/images/image2/2018080117374454032.jpg
Based on this configuration, which statement is true?()
A . The LGWR process concurrently writes the redo log entries to both the members of a group.
B . When a member of a group becomes corrupt, the database crashes.
C . The sizes of the redo01a.log and redo01b.log online redo log members of group Group1 can be different.
D . When redo02a.log and redo02b.log files become corrupt, then the database operations will proceed as normal.
-
Which statement is correct regarding the aaa configurations based on the exhibit provided?()https://assets.asklib.com/images/image2/2018072316572376091.jpg
A . The authentication method list used by the vty port is named test.
B . If the TACACS+ AAA server is not available, no users will be able to establish a Telnet session with the router.
C . If the TACACS+ AAA server is not available, console access to the router can be authenticated using the local database.
D . The authentication method list used by the console port is named test.
-
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
A . Layer 2 mode
B . Layer 3 Edge mode
C . Layer 3 Central mode
D . Layer 3 In-Band mode
-
The GMDSS defines four sea area based on the().
A . location and capacity of the facilities located on board ships
B . Position and type of a sincere sintion
C . Capacity and location of shore based communication facilities
D . Position and capacity of mobile communication statio
-
The soundings on the chart are based on the depth of water available at ().
A . mean low water
B . mean lower low water
C . mean high water
D . mean high water spring
-
Refer to the exhibit. Based on the configuration shown, which queuing mechanism has been configured on interface serial 1/0?()https://assets.asklib.com/images/image2/2018072409525852319.jpg
A . PQ
B . CQ
C . WFQ
D . LLQ
E . CBWFQ
-
Switch 1 was configured as shown below:
https://assets.asklib.com/images/image2/2018073017433720882.jpg
Based on the output shown above,
which statement is true?()
A . IP traffic matching access list is forwarded through VLANs 5-10.
B . All VLAN traffic in VLANs 5-10 that match access list will be forwarded, and all else will be dropped.
C . IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D . All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list is dropped.
E . None of the other alternatives apply
-
You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()
A . fixed-size virtual hard disk (VHD)
B . dynamically expanding virtual hard disk (VHD)
C . differencing disks
D . pass-through disk
-
Which description is correct based on the exhibit and partial configuration?()https://assets.asklib.com/images/image2/2018072315305952241.jpg
A . All traffic destined for network 172.16.150.0 will be denied due to the implicit denyall.
B . All traffic from network 10.0.0.0 will be permitted.
C . Access-list 101 will prevent address spoofing from interface E0.
D . This ACL will prevent any host on the Internet from spoofing the inside network address as the sourceaddress for packets coming into the router from the Internet.
-
Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)filtering?()
A . Configure OSPF between trigger router and black hole routes
B . Configure all edge routers with static (reserved) host route to Null0
C . Configure BGP beteen trigger and black hole routers
D . Configure on trigger router to advertise victim host route with commumity
E . Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)host route configured on edge router
-
A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? ()
A . in global configuration mode, apply the service policy and use the qos pre-classify
B . in global configuration mode, apply the service policy but do not use the qos pre-classify command
C . apply the service policy on the physical interface but do not use the qos pre-classify
D . apply the service policy on the tunnel interface but do not use the qos pre-classify command
E . apply the service policy on the tunnel interface and use the qos pre-classify command
-
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()
A . All defined VLANs are allowed on the trunk by default.
B . Each VLAN, or VLAN range, that is specified with the switchport mode command.
C . Each VLAN, or VLAN range, that is specified with the vtp domain command.
D . Each VLAN, or VLAN range, that is specified with the vlan database command.
-
Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()https://assets.asklib.com/images/image2/2018072517001112103.jpg
A . use a Layer 2 link between distribution switches
B . use a Layer 3 link between distribution switches
C . use a redundant link to the core
D . use a Layer 3 link between distribution switches with route summarizatio
-
You are using the Database Configuration Assistant to configure your Oracle database. Which of the following terms pertains to the creation of an object from which creation of the other database can be based? ()
A . Clone
B . Copy
C . Template
D . Terminal&e
-
Refer to the exhibit. Based on the running configuration that is shown for interface FastEthernet0/2,
what two conclusions can be deduced?()
https://assets.asklib.com/images/image2/2018073010542744892.jpg
A . Connecting a host with MAC address 0000.0000.4147 will move interface FastEthernet0/2 into error disabled state.
B . The host with address 0000.0000.4141 is removed from the secure address list after 5 seconds of inactivity.
C . The sticky secure MAC addresses are treated as static secure MAC addresses after the running configuration is saved to the startup configuration and the switch is restarted.
D . Interface FastEthernet0/2 is a voice VLAN port.
E . The host with address 0000.0000.000b is removed from the secure address list after 300 seconds.
-
Refer to the exhibit. Based on this configuration, what type of marker is achieved?()https://assets.asklib.com/images/image2/2018072409493767045.jpg
A . Single-rate,two-color marker
B . Three-rate,two-color marker
C . Two-rate,three-color marker
D . Single-rate,three-color marker
-
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A . all interfaces in the path toward the destination
B . all networks in the path toward the destination
C . adjacent next hop router in the path toward the destination
D . all routers in the path toward the destination
E . all interfaces through which the packets can be routed
F . type of service and precedence in the IP packet
-
Switch 1 was configured as shown below:
https://assets.asklib.com/images/image2/2018073016050580058.jpg
Based on the output shown above,
which statement is true? ()
A . IP traffic matching access list is forwarded through VLANs 5-10.
B . All VLAN traffic in VLANs 5-10 that match access list will be forwarded, and all else will be dropped.
C . IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D . All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list is dropped.
E . None of the other alternatives apply
-
Based on the username global configuration mode command displayed in the exhibit. What does the optionsecret 5 indicate about the enable secret password?()https://assets.asklib.com/images/image2/2018072315585975684.jpg
A . It is hashed using MD5
B . It is encrypted using a proprietary Cisco encryption algorithm
C . It is hashed using SHA
D . It is encrypted using DH group 5
-
The services on the Internet are all based on one protocol, and the file transfer is based on the protocol of.
-
The 24 Solar Terms is based on the lunar calendar.
-
Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/876248999433f0d62dae02333dece382.jpg' />
A. use a Layer 2 link between distribution switches
B. use a Layer 3 link between distribution switches
C. use a redundant link to the core
D. use a Layer 3 link between distribution switches with route summarization