|
发表于 2017-7-3 13:58:01
|
显示全部楼层
各人答案仅供参考
$ B' O0 Z. \; }' y7 gWhich statement describes the operation of the Generalized TTL Security Mechanism (GTSM), used by routing protocols to prevent some types of attack?" a5 f' o2 i0 q! `
 The TTL in a received packet must be a high value (typically 254-255)
% D6 V1 j* ?* B
. h* X z6 Q+ z; n/ s+ e0 ^; zWhen a user attempted to log in to R1 via the console, the logon was successful but the user was placed in user EXEC mode instead of privileged EXEC mode. What action can you take to correct the problem?& t! W2 W$ \- |/ Z
 Configure the aaa authorization console command under the global configuration 1 F$ R! u& j& {8 c* i* O: X
- d, J3 u& |. U
Refer to the exhibit. What are two effects of the given network configuration?9 z8 ^% }1 r9 k+ T4 H2 ]* U' w1 A& ^0 a
 R2 and R3 fail to form an adjacency k* B6 x1 x' f
 R2 advertises the 192.168.23.0/24 network
# G" Y; h% z% V4 W' Z. z9 u8 p |
32#
2017-7-3 13:58:01
回复(0)
收起回复
|