單項選擇題When you issue the logging trap informational command, what happens? ()

A. An information trap is sent to the SNMP server.
B. Informational and debug messages are logged to the syslog server.
C. All messages are sent to the logging host, where selections are made.
D. All messages from emergencies to informational are sent to the logging host.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which of the following statements about authentication responses and conditions is true? ()(Choose two.)

A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.

2.多項選擇題Which two of the following statements are true about HSRP load sharing?() (Choose two)

A. It is achieved by using more than one HSRP group.
B. It is done in regards to either round robin or weight basis.
C. It is used to offload the active router in a certain HSRP group.
D. Single group HSRP is used to achieve more efficient link utilization.
E. The return traffic is influenced by HSRP load sharing configuration.

3.單項選擇題How are RIP routing contexts implemented in MPLS VPN? ()

A. RIP does not support routing contexts
B. routing contexts are implemented in a single routing process
C. routing contexts are implemented using multiple routing processes
D. routing contexts are implemented as several instances of a single routing process
E. routing contexts are implemented as a single instance of several routing processes

4.多項選擇題Which three of the following steps are mandatory when configuring MPLS on Cisco IOS? ()(Choose three.)

A. start LDP
B. enable CEF switching
C. configure the MPLS ID
D. disable IP TTL propagation
E. configure conditional label advertising
F. enable label switching on frame mode interfaces

5.單項選擇題Why is it appropriate to use conditional label advertising when deploying MPLS? ()

A. to make CEF tables smaller
B. to enable label switching on the frame mode interface
C. to restrict MPLS availability to predefined time periods
D. to restrict label switching to a limited number of networks
E. to restrict end users from seeing the routers in the MPLS network

6.單項選擇題When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()

A. If using IS-IS as the PE-CE routing protocol, no redistribution is required.
B. If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.
C. If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.
D. If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.
E. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

7.單項選擇題Which PIN architecture works with DMVPN, GETVPN, and Ethernet? ()

A.data center
B.teleworker
C.branch
D.campus

9.單項選擇題You are considering deploying the Cisco SSL VPN AIM module in a Cisco 1800 Series Router.Which benefit should you expect?()

A. to improve performance exclusively for SSL VPN applications
B. to improve performance up to 300% for both IPsec and SSL VPN applications
C. to improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardware
D. to improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardware
E. to improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardware

10.單項選擇題What is a primary objective of the security architecture assessment? ()

A. document power and UPS availability
B. to integrate routing and switching components
C. create a design specification document
D. document the customer's current and future technology projects

最新試題

Which command displays only those entries in a BGP table with specific AS_PATH attributes?()

題型:單項選擇題

Refer to the exhibit. Which SSH sessions will the SSH server accept?()

題型:單項選擇題

Which configuration will enable OSPF for IPv6 on FastEthernet 0/0/0?()

題型:單項選擇題

What are four advantages to using tunnel brokers in an IPv6 transition environment?()

題型:多項選擇題

Refer to the exhibit. You want to minimize the downtime that results from supervisor engine switchovers on Cisco 6500 Series Switches and Cisco 7600 Series Routers. To achieve this, you are considering deploying a Cisco Nonstop Forwarding with Stateful Switchover solution using OSPF.In the exhibit you can see the output of the show ip ospf neighbor detail command.Which trait of systems using Cisco Nonstop Forwarding with Stateful Switchover and OSPF is shown in the exhibit output and will impact your plan?()

題型:單項選擇題

Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

題型:多項選擇題

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

題型:多項選擇題

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()

題型:單項選擇題

Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()

題型:單項選擇題

Refer to the exhibit. Which two of these events will be the result of issuing the above command? ()(Choose two.)

題型:多項選擇題