一如所料, 實驗題考LACP & STP 和 HSPR CASE 2
" O/ q7 _. l4 Q- }/ b拖圖題考了5題, 其中題庫的CDP VS LLDP等等, 而不在題庫的有TACACS+和RADIUS (每邊2個選項, 都是問encryption的情況和authentication的情況)" h9 A/ y- o. y, e5 t
選擇題 (題庫) 630, 565, 585, 616, 624, 625, 618
2 t: @5 i: T& X; B8 X0 d不在題庫有以下 (希望幫到大家) ' v2 C/ C( }$ F! J
Which AAAauthorization type applies security policies on a per-user basis?& f, Y+ m3 U! K4 A& u1 X$ O
A. EXEC B. network C. auth-proxy D. command 9 _' j8 u' i' h+ s) Q h2 O" |! X& O" X
- Q- i% x L2 z. K/ S6 j! C3 u8 UYou want adevice to use the local user database if the TACACS+ server is unreachable. WhichAAA login authentication command must you configure? A. aaaauthentication login default group tacacs+ local B. aaaauthentication login TACACS group tacacs+ local C. aaaauthentication login default group local tacacs+ D. aaaauthentication login default group local * Y& r/ f1 L3 i. |5 u
0 E* {% l7 m4 C
Which two tasks must you perform to enable AAA operations with aremote security database? (Choose two.) ; v1 K5 _3 l0 a$ t. p! y; d3 I
A. Configure a user profile in the local database of each device towhich the user will have access. 8 W6 j" P: r5 n# E, J: B) J0 c
B. Configure network equipment to query the remote securitydatabase.
3 |( H5 U. x( }( N$ TC. Configure SSH to provide remote access to network equipment. $ `4 w) N( `3 y# y7 _- _# |
D. Configure Cisco Discovery Protocol on all interfaces used forauthentication.
+ Z0 m6 [, j$ a9 G! KE. Configure user profiles on the remote security database. 1 |. Z6 ? U" T5 X& p: u; d
- U9 Z# Z G$ b1 ^! t
" l2 }9 |6 U* {3 {" o4 D: \7 C; J- \3 ~ j$ ]! J
! y* X( e1 P5 F% Q) z; |& S: s6 b7 V, s
|