niusouti.com

单选题What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A No action required, wide metrics are used by default in IS-IS.B Enable wide-metrics-only under protocols IS-IS.C Enable traffic-engineering under protocol

题目
单选题
What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()
A

No action required, wide metrics are used by default in IS-IS.

B

Enable wide-metrics-only under protocols IS-IS.

C

Enable traffic-engineering under protocols IS-IS.

D

Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).


相似考题
更多“单选题What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A No action required, wide metrics are used by default in IS-IS.B Enable wide-metrics-only under protocols IS-IS.C Enable traffic-engineering under protocol”相关问题
  • 第1题:

    What are the basic configuration steps to enable IS - IS?()

    A. Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

    B. Configure the net sy stem - id and the network net - id commands under routerisis.

    C. Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

    D. Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

    E. Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


    参考答案:A

  • 第2题:

    Examine the following options ,when editing global IPS settings, which one determines if the IOS- basedIPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for thatengine is being compiled?()

    • A、Enable Signature Default
    • B、Enable Engine Fail Closed
    • C、Enable Default IOS Signature ActualTests.com
    • D、Enable Fail Opened

    正确答案:B

  • 第3题:

    What are two commands that can be used to configure MBGP for multicast?()

    • A、Under the BGP group, configure family inet any
    • B、Use the set protocol MBGP command to enable MBGP
    • C、Under the BGP group, configure family inet multicast
    • D、Use the set rib-group command to copy the multicast routes into inet.1

    正确答案:A,C

  • 第4题:

    The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()

    • A、Enable VTP pruning on any switch in the management domain
    • B、Enable VTP pruning on any client switch in the domain
    • C、Enable VTP pruning on a VTP server in the management domain
    • D、Enable VTP pruning on every switch in the domain
    • E、None of the other alternatives apply

    正确答案:C

  • 第5题:

    What are two commands that can be used to configure MBGP for multicast?()

    • A、Under the BGP group, configure family inet any.
    • B、Use the set protocol MBGP command to enable MBGP.
    • C、Under the BGP group, configure family inet multicast.
    • D、Use the set rib-group command to copy the multicast routes into inet.1.

    正确答案:A,C

  • 第6题:

    In JUNOS software, which command is used to configure TED support for OSPF?()

    • A、set protocols rsvp cspf-enable
    • B、set protocols mpls cspf-enable
    • C、set protocols rsvp traffic-engineering
    • D、set protocols ospf traffic-engineering

    正确答案:D

  • 第7题:

    单选题
    Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()
    A

    aaa authentication enable method default

    B

    aaa authentication enable default

    C

    aaa authentication enable level

    D

    aaa authentication enable default local


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()
    A

    Nothing, wide metrics are used by default in IS-IS

    B

    Enable wide-metrics-only under protocol IS-IS

    C

    Enable traffic-engineering under protocols IS-IS

    D

    Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a method to enable remote encryption on Server5. What should you do?()
    A

    Configure the editor’s user account properties to enable Store password using reversible encryption

    B

    Configure the editor’s user account properties to enable Use DES encryption for this account

    C

    Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy

    D

    Configure the Server5 computer account properties to enable Trust computer for delegation


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three WLC items are required to properly enable queuing with TSPEC for voice traffic?()
    A

    configure WLAN setting to enable WMM

    B

    configure WLAN Aironet information elements enabled

    C

    configure global 802.11b/g or 802.11a,or both,voice CAC

    D

    configure WLAN QoS Platinum

    E

    configure DTIM = 2


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    In JUNOS software, which command is used to configure TED support for OSPF?()
    A

    set protocols rsvp cspf-enable

    B

    set protocols mpls cspf-enable

    C

    set protocols rsvp traffic-engineering

    D

    set protocols ospf traffic-engineering


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()
    A

    The enable password is present for backward compatibility.

    B

    Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.

    C

    The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.

    D

    The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()

    • A、aaa authentication enable method default
    • B、aaa authentication enable default
    • C、aaa authentication enable level
    • D、aaa authentication enable default local

    正确答案:B

  • 第14题:

    The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()

    • A、The enable password is present for backward compatibility.
    • B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.
    • C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.
    • D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

    正确答案:A

  • 第15题:

    Which three WLC items are required to properly enable queuing with TSPEC for voice traffic?()

    • A、configure WLAN setting to enable WMM
    • B、configure WLAN Aironet information elements enabled
    • C、configure global 802.11b/g or 802.11a,or both,voice CAC
    • D、configure WLAN QoS Platinum
    • E、configure DTIM = 2

    正确答案:A,C,D

  • 第16题:

    By default, which IS-IS metric types does JUNOS software support?()

    • A、receiving of wide metrics only
    • B、sending of narrow metrics only
    • C、receiving of narrow metrics only
    • D、sending and receiving of narrow and wide metrics

    正确答案:D

  • 第17题:

    What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()

    • A、No action required, wide metrics are used by default in IS-IS.
    • B、Enable wide-metrics-only under protocols IS-IS.
    • C、Enable traffic-engineering under protocols IS-IS.
    • D、Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).

    正确答案:B

  • 第18题:

    What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()

    • A、Nothing, wide metrics are used by default in IS-IS
    • B、Enable wide-metrics-only under protocol IS-IS
    • C、Enable traffic-engineering under protocols IS-IS
    • D、Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).

    正确答案:B

  • 第19题:

    单选题
    By default, which IS-IS metric types does JUNOS software support?()
    A

    receiving of wide metrics only

    B

    sending of narrow metrics only

    C

    receiving of narrow metrics only

    D

    sending and receiving of narrow and wide metrics


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    What protocol is used for Path Setup in MPLS traffic engineering?()
    A

    OSPF

    B

    ISIS

    C

    BGP

    D

    RSVP

    E

    PIM


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
    A

    If the radius server returns an error, the enable password will be used

    B

    If the radius server returns a ’failed’ message, the enable password will be used

    C

    The command login authentication group will associate the AM authentication to a specifiedinterface

    D

    If the group database is unavailable, the radius server will be used


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    What are the basic configuration steps to enable IS - IS?()
    A

    Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

    B

    Configure the net sy stem - id and the network net - id commands under routerisis.

    C

    Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

    D

    Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

    E

    Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which routing protocol by default uses bandwidth and delay as metrics()。
    A

    RIP

    B

    BGP

    C

    OSPF

    D

    EIGRP


    正确答案: A
    解析: 暂无解析