计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
Cisco(思科)
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
填空题1. A ______ cloud is a collection of routers that are configured with either an mGRE interface or a point-to-point GRE interface (or a combination of the two) and that share the same subnet. ______网云是一个配置了mGRE接口或点到点GRE接口(或两者共存)的路由器集合,这些路由器共享相同的子网。
进入题库练习
填空题18. ______ gives you the ability to limit the source of management traffic to a specific interfaceon a device. ______具备限制指定的设备接口接收管理流量的能力。
进入题库练习
填空题1. The ISR uses the identity certificate to ______ itself to remote clients. ISR使用身份证书向远程客户端来______自己。
进入题库练习
填空题 When deploying PKI-enabled VPNs
进入题库练习
填空题10. A ______ is essentially an electronic repository of keys and their respective shared secretand validity schedules. ______是保存密钥及其共享密钥与有效期的一种存储机制。
进入题库练习
填空题24. The Cisco IOS IPS router can send IPS alerts through ______ and can have the ______ feature enabled at the same time. Cisco IOS IPS路由器具备同时通过______发送IPS告警并启用______的能力。
进入题库练习
填空题9. The part of the network that typically connects to end users that all exist within similargeographic areas is defined in the ______ design blueprint. 用于连接某一地理区域内的终端用户的网络定义在______设计蓝图中。
进入题库练习
填空题11. Politics within an organization can cause a lack of ______ within the security policies. 企业或组织内部的争斗倾轧可能导致安全策略缺乏______。
进入题库练习
填空题16. ______ IP addressing is mandatory with DVTI tunnels. DVTI隧道必须采用______IP寻址方式。
进入题库练习
填空题1. The control plane includes the group of processes that are run at the ______ level and control most high-level control IOS functions. 控制面包括运行在______并控制最高级IOS功能的进程组。
进入题库练习
填空题8. The recommended hash algorithm to provide message authentication and integrity is ______. 用于提供消息认证和完整性的推荐散列算法是______。
进入题库练习
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?
进入题库练习
Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?
进入题库练习
Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?
进入题库练习
Which statement about access lists that are applied to an interface is true?
进入题库练习
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
进入题库练习
Refer to the exhibit:The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
进入题库练习
Which three statements about the features of SNMPv2 and SNMPv3 are true?
进入题库练习
You are working in a data center environment and are assigned the address range 10.188.31.0/23.You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each.Which IP address range meets these requirements?
进入题库练习
Refertotheexhibit.Whichstatementistrue?
进入题库练习