计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
填空题 When using EAP-MD5
进入题库练习
填空题17. The ______ SNMP security model supports both authentication and encryption. ______ SNMP安全模型同时支持认证与加密。
进入题库练习
填空题 GET VPNs provide connectionless
进入题库练习
填空题19. If the key server fails to get a ______ to a rekey message from the group member after three rekeys, it removes the group member. 如果密钥服务器连续3次没有从组成员那里接收到关于密钥更新消息的______,那么密钥服务器将移除组成员关系。
进入题库练习
填空题5. The Network Time Protocol (NTP)is typically used with the ______ SCF action. 网络时间协议(NTP)通常与SCF定义的______行为配合使用。
进入题库练习
填空题2. ______ can increase the risk to remote clients and internal resources because the clients can potentially act as a relay between untrusted and trusted networks. ______会给远程客户端和内部资源带来风险,因为客户端可能成为不可信任网络和可信任网络之间的中继设备。
进入题库练习
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?
进入题库练习
Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?
进入题库练习
Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?
进入题库练习
Which statement about access lists that are applied to an interface is true?
进入题库练习
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
进入题库练习
Refer to the exhibit:The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
进入题库练习
Which three statements about the features of SNMPv2 and SNMPv3 are true?
进入题库练习
You are working in a data center environment and are assigned the address range 10.188.31.0/23.You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each.Which IP address range meets these requirements?
进入题库练习
Refertotheexhibit.Whichstatementistrue?
进入题库练习
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch fromhost A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pingsto the other two hosts are successful.what is the issue?
进入题库练习
Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet segments would need to be configured as trunk links?
进入题库练习
Refer to the exhibit. What can be determined about routes that are learned from the router at IP address 190.171.23.12?
进入题库练习
What are the benefit of using Netflow?
进入题库练习
Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but has failed to configure routing properly. Which configuration will allow the hosts on the Branch LAN to access resources on the HQ LAN with the least impact on router processing and WAN bandwidth?
进入题库练习