itgle.com

What are the basic configuration steps to enable IS - IS?()A. Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B. Configure the net sy stem - id and the network net - id commands u

题目
What are the basic configuration steps to enable IS - IS?()

A. Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

B. Configure the net sy stem - id and the network net - id commands under routerisis.

C. Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

D. Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

E. Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


相似考题
更多“What are the basic configuration steps to enable IS - IS?() ”相关问题
  • 第1题:

    The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()

    • A、The enable password is present for backward compatibility.
    • B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.
    • C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.
    • D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

    正确答案:A

  • 第2题:

    A customer with IPCC Express Standard reports that a script using the Database steps is not working. What is the most likely root cause?()

    • A、The script probably has an error in the DSN configuration.
    • B、IPCC Express Standard is not licensed for Database steps.  
    • C、The script probably has an error in the query string.  
    • D、There is probably an interoperability problem between IPCC Express and the database.

    正确答案:B

  • 第3题:

    What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()

    • A、Enable the IGMP snooping capability and define the IGMP timeout period.
    • B、Set the Ethernet multicast mode to Enabled, enable the IGMP snooping capability, and define the IGMP  timeout period.
    • C、Set the multicast monitor function to Enabled, enable the IGMP snooping capability, and define the  mandatory data rate to the minimum value supported.
    • D、Set the Ethernet multicast mode to Multicast and define the multicast group address.

    正确答案:D

  • 第4题:

    What’s the steps of implementing MQC?


    正确答案: 1、Define a traffic class by using the class-map command.
    2、Create a traffic policy by using the policy-map command.
    3、Attach the traffic policy (policy map) to the interface by using the service-policy command.

  • 第5题:

    As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()

    • A、Set the enable secret command to privilege level 5
    • B、The enable secret password is hashed using MD5
    • C、The enable secret password is for accessing exec privilege level 5
    • D、The enable secret password is hashed using SHA
    • E、The enable secret password is encrypted using Cisco proprietary level 5 encryption

    正确答案:C

  • 第6题:

    You want to configure WebLogic so that Managed Servers are restarted when they are in a  FAILED state. Which three steps are necessary to accomplish this?()

    • A、Configure Node Manager on the machines where WebLogic Managed Servers need to be  started/restarted.
    • B、Enable "Auto Restart" in the Node Manager Configuration.
    • C、Enable "Auto Kill if Failed" in the Node Manager Configuration.
    • D、Enable "Auto Kill if Failed" for the Managed Server in question.
    • E、Enable "Auto Restart" for the Managed Server in question.

    正确答案:A,D,E

  • 第7题:

    You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()

    • A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.
    • B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.
    • C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.
    • D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

    正确答案:D

  • 第8题:

    单选题
    A customer with IPCC Express Standard reports that a script using the Database steps is not working. What is the most likely root cause?()
    A

    The script probably has an error in the DSN configuration.

    B

    IPCC Express Standard is not licensed for Database steps.  

    C

    The script probably has an error in the query string.  

    D

    There is probably an interoperability problem between IPCC Express and the database.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    What is the effect of using the service password-encryption comma()。
    A

    Only the enable password will be encrypted.

    B

    Only the enable secret password will be encrypted.

    C

    Only passwords configured after the command has been entered will be encrypted.

    D

    It will encrypt the secret password and remove the enable secret password fromthe configuration.

    E

    It will encrypt all current and future passwords.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Assume that you would like to clone an existing WebLogic Domain and enable some  customizations. What scenario would you choose?()
    A

    In the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain from the context menu. In the graphical wizard, customize and extend the domain if needed. These steps will only clone only the domain configuration. Binaries with deployments are needed  to be cloned by operation on the file system.  

    B

    In the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain  from the context menu. In the graphical wizard, customize the domain. These steps clone the  binaries and domain configuration. If the extension is needed, perform it after cloning in the  WebLogic web-based console. 

    C

    In the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain from the context menu. In the graphical wizard, customize and extend the domain if it is needed. These steps clone the binaries and domain configuration.  

    D

    In the Enterprise Manager, find the domain to be cloned. Choose Clone WebLogic Domain  from the context menu. These steps clone the binaries and domain configuration. If the customization or extension is needed, complete that after cloning in the WebLogic web-based console.  

    E

    In the file system, copy the domain structure of the configuration directory and paste it in the new location. Modify configuration files for address and port. If further customization is needed, open the WebLogic web-based console and perform these modifications.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()
    A

    GPT disks and basic disks

    B

    GPT disks and dynamic disks

    C

    MBR disks and basic disks

    D

    MBR disks and dynamic disks


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    What is the effect of using the service password-encryption command?()
    A

    nly passwords configured after the command has been entered will be encrypted.

    B

    Only the enable password will be encrypted.

    C

    Only the enable secret password will be encrypted

    D

    It will encrypt the secret password and remove the enable secret password from the configuration.

    E

    It will encrypt all current and future passwords.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)

    • A、Apply the method list to an interface
    • B、Specify the default method list and apply it to the interface
    • C、Enable AAA
    • D、Define a method list

    正确答案:A,C,D

  • 第14题:

    What are two steps that must be taken when mitigating a worm attack?()

    • A、Inoculate systems by applying update patches. 
    • B、Limit traffic rate. 
    • C、Apply authentication. 
    • D、Quarantine infected machines. 
    • E、Enable anti-spoof measures.

    正确答案:A,D

  • 第15题:

    Which CLI mode allows you to make configuration changes?()

    • A、enable mode
    • B、configuration mode
    • C、operational mode
    • D、active mode

    正确答案:B

  • 第16题:

    A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()

    • A、Erase flash.
    • B、Restart the switch.
    • C、Delete the VLAN database.
    • D、Erase the running configuration.
    • E、Erase the startup configuration.
    • F、Modify the configuration register.

    正确答案:B,C,E

  • 第17题:

    You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()

    • A、Enable BPD guard
    • B、Disable CDP on ports where it is not necessary
    • C、Place unused ports in a common unrouted VLAN
    • D、Prevent automatic trunk configuration
    • E、Implement port security

    正确答案:C,D

  • 第18题:

    Assume that you would like to clone an existing WebLogic Domain and enable some  customizations. What scenario would you choose?()

    • A、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if needed. These steps will only clone only the domain configuration. Binaries with deployments are needed  to be cloned by operation on the file system.  
    • B、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain"  from the context menu. In the graphical wizard, customize the domain. These steps clone the  binaries and domain configuration. If the extension is needed, perform it after cloning in the  WebLogic web-based console. 
    • C、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if it is needed. These steps clone the binaries and domain configuration.  
    • D、In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain"  from the context menu. These steps clone the binaries and domain configuration. If the customization or extension is needed, complete that after cloning in the WebLogic web-based console.  
    • E、In the file system, copy the domain structure of the configuration directory and paste it in the new location. Modify configuration files for address and port. If further customization is needed, open the WebLogic web-based console and perform these modifications.

    正确答案:C

  • 第19题:

    单选题
    As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()
    A

    Set the enable secret command to privilege level 5

    B

    The enable secret password is hashed using MD5

    C

    The enable secret password is for accessing exec privilege level 5

    D

    The enable secret password is hashed using SHA

    E

    The enable secret password is encrypted using Cisco proprietary level 5 encryption


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    What are the basic configuration steps to enable IS - IS?()
    A

    Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.

    B

    Configure the net sy stem - id and the network net - id commands under routerisis.

    C

    Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.

    D

    Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.

    E

    Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()
    A

    Enable Anonymous access. Enable Integrated Windows authentication.

    B

    Enable Anonymous access. Enable Basic authentication.

    C

    Disable Anonymous access. Enable Integrated Windows authentication.

    D

    Disable Anonymous access. Enable Basic authentication.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()
    A

    Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.

    B

    Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.

    C

    Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.

    D

    Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)
    A

    Apply the method list to an interface

    B

    Specify the default method list and apply it to the interface

    C

    Enable AAA

    D

    Define a method list


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()
    A

    Erase flash.

    B

    Restart the switch.

    C

    Delete the VLAN database.

    D

    Erase the running configuration.

    E

    Erase the startup configuration.

    F

    Modify the configuration register.


    正确答案: F,E
    解析: 暂无解析