A.service timestamps log datetime
B.logging trap datetime
C.service logging datetime
D.logging datetime on
E.logging timestamps on
您可能感興趣的試卷
你可能感興趣的試題
A.By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B.By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C.By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D.By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
A.LDP hello packets are sent to UDP port 646
B.LDP hello packets are sent to TCP port 711
C.LDP sessions are TCP sessions to port 646
D.LDP sessions are TCP sessions to port 711
E.LDP establishes a peer relationship with another router that must be directly attached
F.LDP can establishes a peer relationship with another router that is not directly attached
A.DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B.DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C.In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D.DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.
A.The configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1
B.A route distinguisher can be imported and exported to and from a VRF
C.Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.
D.Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.
A.Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.
B.Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.
C.Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.
D.Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.
E.Control Plane Policing (CoPP) protects the transit management and data traffic through the router.
A.MPLS TE FR
B.MPLS VPN
C.BFD
D.RSVP
E.VPLS
F.SNMP
A.Lower power consumption
B.Lower maintenance cost
C.Simplified configuration
D.Deterministic performance
E.Longer uptime
A.AF Class
B.Drop Probability
C.CS(Class Selector Value )
D.PHB (Per-Hop Behavior )
E.IP Precedence
F.Queue Depth
A.Section
B.Line
C.Frame
D.Path
E.DS1
A.IP source address is forged
B.IP destination address is forged
C.IP TCP source port is forged
D.IP TCP destination port is forged
E.None of above
最新試題
Which option describes a benefits of IPv6 VPN Provider Edge?()
Which information is carried in the OSPFv3 intra-area Prefix LSA?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which two statements about DS-Lite are true?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which statement about the use of Route Target Rewrite is true?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
What is the BGP synchronization rule?()
Which statement about VPLS is true?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()