單項選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1
Cisco 642-832: Practice Exam

Figure 2
Trouble Ticket Statement:
Client 1 is able to ping 10.1.1.2 but not 10.1.1.1. Initial troubleshooting shows that R1 does not have anyOSPF neighbors or any OSPF routes
Configuration on R1:
router ospf 1
CertKiller.com
log-adjacency-changes
network 10.1.1.0 0.0.0.3 area 12
default-information originate always!
interfaceSerial0/0/0/0.12 point-to-point
ip address 10.1.1.1 255.255.255.252
ip nat inside
ip ospf message-digest-key 1 md5 TSHOOT
Configuration on R2:
router ospf 1
log-adjacency-changes
network 10.1.1.0 0.0.0.3 area 12!
Cisco 642-832: Practice Exam
interfaceSerial0/0/0/0.12 point-to-point
ip address 10.1.1.2 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 TSHOOT
What is the solution of the fault condition?()

A.ipospf authentication message-digestcommand has to be added on S0/0/0/0.12
B.ipospf authentication message-digestcommand has to be added under the OSPF routing process
C.A static route to 10.1.1.4 must be added on R1
D.ipnat outside must be added on S0/0/0/0.12


您可能感興趣的試卷

你可能感興趣的試題

4.單項選擇題

The following command is issued on a Cisco Router:
Router(configuration)#logging console warnings
Which alerts will be seen on the console?()

A.Warnings only
B.debugging, informational, notifications, warnings
C.warnings, errors, critical, alerts, emergencies
D.notifications, warnings, errors
E.warnings, errors, critical, alerts

5.單項選擇題You have 2 NTP servers in your network - 10.1.1.1 and 10.1.1.2. You want to configurationure a Ciscorouter to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which commands will you use toconfigurationure the router?()

A.ntp server 10.1.1.1 ntp server 10.1.1.2
B.ntp server 10.1.1.1 ntp server 10.1.1.2 primary
C.ntp server 10.1.1.1 ntp server 10.1.1.2 prefer
D.ntp server 10.1.1.1 fallback ntp server 10.1.1.2

最新試題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

Which statement about PPPoA configuration is correct?()

題型:單項選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Match the xDSL type on the above to the most appropriate implementation on the below.

題型:問答題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題