單項選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1
Cisco 642-832: Practice Exam

Figure 2
Trouble Ticket Statement
HSRP has been configurationured between DSW1 and DSW2. DSW1 is configurationured to be activerouter but it never becomes active even though the HSRP communication between DSW1 and DSW2 isworking.
Configuration on DSW1
CertKiller.com
track 1 ip route 10.1.21.128 255.255.0.0 metric threshold threshold metric up 1 down 2!
track 10 ip route 10.2.21.128 255.255.255.0 metric threshold threshold metric up 63 down 64!
interface Vlan10
ip address 10.2.1.1 255.255.255.0
standby 10 ip 10.2.1.254
standby 10 priority 200
standby 10 preempt
standby 10 track 1 decrement 60
Configuration on R4
Cisco 642-832: Practice Examinterface loopback0
ip address 10.2.21.128 255.255.255.0
On which device is the fault condition located?()

A.R4
B.DSW2
C.DSW1
D.R3


您可能感興趣的試卷

你可能感興趣的試題

5.單項選擇題

The following command is issued on a Cisco Router:
Router(configuration)#logging console warnings
Which alerts will be seen on the console?()

A.Warnings only
B.debugging, informational, notifications, warnings
C.warnings, errors, critical, alerts, emergencies
D.notifications, warnings, errors
E.warnings, errors, critical, alerts

最新試題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:單項選擇題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:單項選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:問答題