單項選擇題Which IPsec security protocol should be used when confidentiality is required?()

A. AH
B. MD5
C. PSK
D. ESP


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which command can you use to manually assign a static IPV6 address to a router interface?()

A. ipv6 address PREFIX_1::1/64
B. ipv6 autoconfig 2001:db8:2222:7272::72/64
C. ipv6 autoconfig
D. ipv6 address 2001:db8:2222:7272::72/64

2.單項選擇題Why will a switch never learn a broadcast address?()

A. Broadcast frames are never sent to swiches.
B. Broadcast addresses use an incorrect format for the switching table.
C. A broadcast address will never be the source address of a frame.
D. Broadcasts only use network layer addressing.
E. A broadcast frame is never forwarded by a switch.

3.單項選擇題Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()

A. link bandwidth
B. hop count
C. link cost
D. administrative distance
E. link delay

4.單項選擇題VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?()

A. The command is accepted and the respective VLAN is added to vlan dat.
B. The command is rejected.
C. The command is accepted and you must configure the VLAN manually.
D. The port turns amber.

5.單項選擇題The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()

A. 10.10.0.0/18 subnetted with mask 255.255.255.252
B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252

6.單項選擇題Which component of VPN technology ensures that data can be read only by its intended recipient?()

A. data integrity
B. encryption
C. key exchange
D. authentication

8.單項選擇題When a host transmits data across a network to another host, which process does the data go through?()

A. standardization
B. conversion
C. encapsulation
D. synchronization

9.單項選擇題A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()

A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com

10.單項選擇題Which line from the output of the show ip interface command indicates a layer 1 problem?()

A. Serial0/1 is up, line protocol is down
B. Serial0/1 is down, line protocol is down
C. Serial0/1 is up, line protocol is up
D. Serial0/1 is administratively down, line protocol is down

最新試題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項選擇題

How are VTP advertisements delivered to switches across the network?()

題型:單項選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題