單項選擇題

The following commands are issued on a Cisco router:

What would be the output shown on the console?()

A.All IP packets passing through the router
B.Only IP packets with the source address of 10.1.1.1
C.All IP packets from 10.1.1.1 to 172.16.1.1
D.All IP packets between 10.1.1.1 to 172.16.1.1


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of the following options are categories of Network Maintenance tasks?()

A.Firefighting
B.Interrupt-driven
C.Policy-based
D.Structured
E.Foundational

3.單項選擇題Which alerts will be seen on the console when running the command: logging console warnings.()

A.warnings only
B.warnings, notifications, error, debugging, informational
C.warnings, errors, critical, alerts, emergencies
D.notifications, warnings, errors
E.warnings, errors, critical, alerts

4.多項選擇題FCAPS is a network maintenance model defined by ISO. What does it stand for?()

A.Action Management
B.Fault Management
C.Configuration Management
D.Protocol Management
E.Security Management

最新試題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:單項選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

cisco ios command to interface dialer 0

題型:問答題