The relevant configuration files for the TestKing1 and TestKing2 routers are displayed below:With due consideration to the command outputs, which of the following reasons would you attribute the connectivity problem between the two routers?()
A. The authentication needs to be changed to PAP for both routers.
B. The serial IP addresses of routers are not on the same subnet.
C. The username/password combination is incorrectly configured.
D. The router names are incorrectly configured.
第1题:
Part of the configuration files for routers testking1 and testking2 are displayed below:If you were to enter the "show interface serial 0" command on router testking1,which of the following will be displayed?()
A. Serial 0 is down, line protocol is down
B. Serial 0 is up, line protocol is up
C. Open: IPCP, CDPCP
D. LCP closed
E. LCP open
第2题:
You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()
A. Link state routing protocol is missing.
B. Incorrectly configured IP addresses
C. IGRP is incorrectly configured.
D. Frame relay is not configured.
E. None of the above
第3题:
The routers named Testking1 and Testking2 are both configured with RIP only.What will happen in the event of Testking1 receiving a routing update that contains a higher cost path to a network already in its routing table?()
第4题:
You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()
第5题:
Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.)
第6题:
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
第7题:
Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
Disable all LM and NTLM authentication methods on TestKing1.
Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
第8题:
The update information will be added to the existing routing table.
The update information will replace the existing routing table entry.
The update will be ignored and thus no further action will occur.
The existing routing table entry will be purged from the routing table and all routers will attempt convergence.
第9题:
Move the files and folders from TESTKING1 to TESTKING2.
Copy the files and folders from TESTKING1 to TESTKING2.
Change the NTFS permissions on TESTKING2 to match the NTFS permissions on TESTKING1.
Back up the files and folders in TESTKING1 and restore them, including permissions, to TESTKING2.
第10题:
Secure Device Authentication
Remote Administration
Bulk Flash storage
Secure Configuration Files Distribution
Storage of Removable Credentials
Increase RAM Memory for the Router
第11题:
Computer Configuration/Software Settings/Software Installation
User Configuration/Software Settings/Software Installation
Computer Configuration/Administrative Templates/Windows Components/Windows Installer
User Configuration/Administrative Templates/Windows Components/Windows Installer
Computer Configuration/Administrative Templates/Windows Components/Windows Update
User Configuration/Administrative Templates/Windows Components/Windows Update
第12题:
Datastore Control Center
Alarm and Trace Configuration
Custom File Configuration
Control Center
第13题:
You are a network technician at TestKing, Inc. You are currently troubleshooting a routing issue on the Testking1 router. You issue the show ip route command. The output from the command is displayed in the following exhibit:Which one of the following routes WILL NOT be entered into its neighboring routers routing table?()
A. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
B. C 192.168.1.0/24 is directly connected, Ethernet0
C. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
E. None of the above
第14题:
( ) is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project.
第15题:
What are four uses of the USB ports in the Cisco integrated services routers?()
第16题:
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
第17题:
Which three initial configuration methods are supported on J-series routers?()
第18题:
CLI
J-Web
JUNOScope
autoinstallation
PCMCIA flash card
第19题:
Perform POST, locate configuration statements, apply configuration statements, locate Cisco IOS software, and load Cisco IOS software.
Locate Cisco IOS software, load Cisco IOS software, locate configuration statements, apply configuration statements, and perform POST.
Test software routines, POST, load configuration files, load Cisco IOS software, test Cisco IOS software.
POST, locate Cisco IOS software, load the Cisco IOS software, locate configuration statements, and apply configuration statements.
Load and test IOS, load configuration files, test software routines, POST.
第20题:
Internal routers within the backbone area (area 0)
Internal routers within the NSSAs
Internal routers within the stubby areas
ASBRs
ABRs
DRs and BDRs
第21题:
CLI
J-Web
JUNOScope
PCMCIA flash card
第22题:
Perform the ASR restore procedure.
Restart Windows by using the Last Known Good configuration option.
Start the Recovery Console and replace the corrupted .dll file with a copy from the Salesapp CD-ROM.
Reinstall Windows Server 2003. Do not format any volumes.
第23题:
In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.
In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.
You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.
You can use the show standby command to verify HSRP operation and configuration.
If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.