A.The default-metric command configured under the appropriate interface
B.The metric parameter in the network command of a routing process
C.The metric parameter in the redistribute command
D.The default-metric command
E.A route-map containing a seed command
F.A route map containing a metric command
您可能感興趣的試卷
你可能感興趣的試題
A.Designated port
B.Nonswitch port
C.Switch port
D.Nonroot port
E.Nondesignated port
F.Root port
A.show ip eigrp topology
B.show ip eigrp adjacency
C.show ip eigrp routes
D.show ip eigrp database
E.show ip route eigrp
F.show ip eigrp forwarding
A.255.255.255.255
B.224.0.0.6
C.FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF:FFF
D.FF02::10
E.224.0.0.10
F.FF02::5
A.Rl(config-if)#ipv6 default-information originate
B.Rl(config-router)#ipv6 rip 〈process-name〉 default-information only
C.Rl(config)#ipv6 route ::/0 null 0
D.Rl(config-if)#ipv6 rip 〈process-name〉 default-information only
E.Rl(config-router)#ipv6 rip route ;:/0 originate
F.Rl(config-router)#aggregate-address ::/0 summarize-routes
A.Ping 10.1.1.1 Data Pattern M
B.Ping 10.1.1.1 timeout 0
C.Ping 10.1.1.1 size 1500 df-bit
D.Ping 10.1.1.1 source loopback 0
E.Ping 10.1.1.1 size 1500
F.Ping 10.1.1.1 size 1500 Strict
最新試題
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Which statement about PPPoA configuration is correct?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()