A.RIP
B.BGP
C.OSPF
D.EIGRP
您可能感興趣的試卷
你可能感興趣的試題
A.hub
B.router
C.switch
D.STP
E.subinterfaces
F.VLAN
A.This is a 10 Mb/s switch port.
B.This is a 100 Mb/s switch port.
C.This is an Ethernet port operating at half duplex.
D.This is an Ethernet port operating at full duplex.
E.This is a port on a network interface card in a PC
A.IR
B.DSSS
C.FHSS
D.DSSS and FHSS
E.IR, FHSS, and DSSS
A.ATM
B.IDS
C.IOS
D.IOX
E.IPS
F.SDM
A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption.
最新試題
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
Which command encrypts all plaintext passwords?()
What is the default administrative distance of OSPF?()
Which command is used to display the collection of OSPF link states?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which IPsec security protocol should be used when confidentiality is required?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()