A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds
您可能感興趣的試卷
你可能感興趣的試題
A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
A. 4to6 routing
B. 6to4 routing
C. binary routing
D. dual-stack routing
E. NextGen routing
最新試題
What is the purpose of the cisco Vlan Trunking protocol?()
Which command encrypts all plaintext passwords?()
What is the default administrative distance of OSPF?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
Which statement is true, as relates to classful or classless routing?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
On which options are standard access list based?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
Which IPsec security protocol should be used when confidentiality is required?()