A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction
您可能感興趣的試卷
你可能感興趣的試題
A.Cable modems only operate at Layer 1 of the OSI model.
B.Cable modems operate at Layers 1 and 2 of the OSI model.
C.Cable modems operate at Layers 1, 2, and 3 of the OSI model.
D.A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.
E.A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.
A.Dead Peer Detection (DPD)
B.CDP
C.isakmp keepalives
D.GRE keepalive mechanism
E.The hello mechanism of the routing protocol across the IPsec tunnel
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
A.The route-target both 100:2 command sets import and export route-targets for vrf2.
B.The route-target both 100:2 command changes a VPNv4 route to a IPv4 route.
C.The route-target import 100:1 command sets import route-targets routes specified by the route map.
D.The route-target import 100:1 command sets import route-targets for vrf2 that override the other route-target configuration.
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
A.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed without going through the encrypted tunnel.
B.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed through the encrypted tunnel.
C.Any protected subnets that are entered represent subnets at the VPN server site that will be accessed without going through the encrypted tunnel.
D.Any protected subnets that are entered represent subnets at the VPN server site that will be accessedthrough the encrypted tunnel.
A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
最新試題
Which three categories of signatures can a Cisco IPS microengine identify?()
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
What are two steps that must be taken when mitigating a worm attack?()
Which three statements about IOS Firewall configurations are true?()
Which statement is true about a worm attack?()
What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()
If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()
Refer to the exhibit. What type of security solution will be provided for the inside network?()
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()
Which form of DSL technology is typically used as a replacement for T1 lines?()