多項(xiàng)選擇題All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()

A.SNMP traps
B.fabric cards
C.exec-level configuration
D.privilege-level configuration
E.admin-level configuration


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題In optical channel transport unit overhead (OTU OH), what are general communication channels 1 and 2(GCC1/GCC2) used for?()

A.for trail trace identification
B.as the backward defect indicator
C.to transmit information between OTU termination points
D.to extend command and management functions over several frames
E.General communication channels 1 and 2 (GCC1/GCC2) do not belong to OTU OH

2.多項(xiàng)選擇題Which three of these statements about PPPoE are true?()

A.PPPoE can provide a host with access to a destination over Ethernet. You can have only one  PPPoE session per PVC
B.You must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPE
C.You cannot use PPPoE with Cisco Service Selection Gateway
D.PPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacks
E.Per-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a minimum access charge

3.單項(xiàng)選擇題What is the order of preference for these commands when all of them are applied to one neighbor in theBGP inbound filter direction?()

A.prefix-list, route-map, filter-list, distribute list
B.route-map, filter-list, prefix-list, distribute-list
C.route-map, distribute-list, prefix-list, filter-list
D.filter-list, prefix list, route-map, distribute list
E.distribute list, prefix-list, route-map, fitter list

4.多項(xiàng)選擇題What are two uRPF working modes?()

A.express mode
B.safe mode
C.loose mode
D.strict mode
E.tight mode

5.多項(xiàng)選擇題Which four statements about an IP service level agreement (SLA) are true? ()

A.SLA responder knows type of operation, the port used, and duration.
B.SLA responder inserts in and out timestamps in the packet payload.
C.SLA sender and responder use the IP SLA Control Protocol to communicate with each other before
D.SLA sender and responder communication can be encrypted.
E.SLA sender and responder communication can be authenticated with MD5.