A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM
您可能感興趣的試卷
你可能感興趣的試題
A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.
A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.
A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service
A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK
A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C.Configure many sub-interfaces on the same subnet.
D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
A.Allow users to develop their own approach to network security.
B.Physically secure network equipment from potential access by unauthorized individuals.
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E.Minimize network overhead by deactivating automatic antivirus client updates.
A.It has the same maximum hop count as version 1.
B.It uses broadcasts for its routing updates.
C.It is a classless routing protocol.
D.It has a lower default administrative distance than RIP version 1.
E.It supports authentication.
F.It does not send the subnet mask in updates.
A.It establishes a static route to the 172.16.3.0 network.
B.It establishes a static route to the 192.168.2.0 network.
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E.It uses the default administrative distance.
F.It is a route that would be used last if other routes to the same destination exist.
A.It is locally significant.
B.It is globally significant.
C.It is needed to identify a unique instance of an OSPF database.
D.It is an optional parameter required only if multiple OSPF processes are running on the router.
E.All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
最新試題
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
Which command displays the CHAP authentication process as it occurs between two routers?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which command encrypts all plaintext passwords?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Which pairing reflects a correct protocol-and-metric relationship?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
How are VTP advertisements delivered to switches across the network?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()