- 积分
- 345
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|
Hello ( Y) ?) ^8 I. Q3 `5 k# ]
8 v5 A# i* D! _4 f9 |
I've just pass the Exam today I read 18/06/2019 dump only 1 a1 ~; A5 b/ F2 G
& p/ @. n7 e* }2 N9 u1. MCQ everything in 18/06/2019 dump but just 1 question I have never seen before' Q( |) v) C! L3 r+ V
% p% D2 E( [6 k9 b- V) }: [6 L
the new question that I found
, T! S$ f% o( E& l: G, M
3 W2 b4 R) |8 F: |: [4 w0 Iaaa authenication login authorization group tacacs+ 0 r- F7 y) X% E, Z, x5 W+ _
tacas-server host 192.168.1.1
& F0 r& z4 a# x4 \0 atacas-server key cisco# p; Q) q! Y1 S
vty 0 4
+ P5 u0 T# N ^3 \4 a5 ^login authentication authorization: K7 C/ D* Z& k8 H F0 \4 B- j
ans : when user login by VTY 0 4 it authen by tacacs+ << something like that I can't remember/ P; a. p6 }5 g1 A' T* f+ Z- ?
3 a7 C" T) [% T( B4 A. s2. Drag and Drop Just 4 drag that i found
2 y4 H( v( d. z ^0 `4 t-AAA features
* {" D5 m6 P2 k+ o7 ^% B8 L6 B+ }+ Authentication: challenge and response operation
) D9 T# ], @# v$ K+ Accounting: feature that logs network usage
& L7 I" {: G0 R+ TACACS+: authentication method that uses TCP
: _6 S: }+ ?) O6 g8 @+ RADIUS: authentication method that uses UDP. V4 i; V; |3 J: K. f8 B
+ Authorization: controls specific access privileges of a user/ ~& s o. u! B0 J7 W* N9 J2 e
; e y4 c% z* l5 d$ O, s- P4 m, X+ ?; {
frame-relay component, U) v3 z. w% X
3 y% d2 n1 T/ x P& u+ `
+ SVC: A circuit that provides temporary on-demand connections between DTEs
+ M2 V2 J% ~! _% C! S+ l' [+ LMI: A signaling mechanism for Frame Relay devices b c( V8 A" R! |& x6 R
+ DLCI: A locally significant ID$ P/ m" O0 V) o& B- q2 k
+ FECN: An indicator of congestion on the network5 G& {! @0 e# ^' O+ u. i8 W
+ PVC: A logical connection comprising two endpoints and a CIR
/ i' L# k+ _4 v. y9 v: g6 a
! k5 k% {! V- G+ L9 v1 X; A* lNAT64:
4 c$ i9 P; ~- j) ^9 u/ ]1 O+ Use Network-specific prefix- {- V0 U% R6 J$ w" X. @4 _
+ Modify session during translation$ r* n% k6 u6 C" q* d
NPTv6:7 \+ t8 I" S8 w7 N7 z8 }
+ Modify IP header in transit; J5 n6 \4 n9 i' P4 l
+ Map one IPv6 address prefix to another IPv6 prefix
3 l/ |' h, Y+ a. d, G# |- F) w2 C X) C# T7 `# R+ S9 G
uRPF
+ E) U g& k. ?+ l- {" w- V- D j4 O8 u" G( c6 V2 c6 Q
Loose Modes:
6 Z! H9 g4 O% x; R5 l7 D3 \+ It supports using the default route as a route reference 0 A8 W# r8 \: Z( a% k0 `
+ It requires the source address to be routable
u1 B! B; P, x8 G. |" C" t* c" QStrict Modes:
2 { ]9 W& f. F7 `& w+ It can drop legitimate traffic1 v3 _! b" P2 U+ K; h9 P: c
+ It permits only packets that are received on the same interface as the exit interface for the destination address
$ g5 ~# A# l3 H# K
, h! n+ }+ c- Q6 s2 @6 Z' |0 z. V; R# b( \$ ?2 e a5 i
and 3. LAB - V3 F. U- E' C3 M* O7 w
-OPSF EIGRP redrist5 { W8 F3 |1 `3 o& Z) v) p
-PBR% S# [$ h7 } x1 i! K% e0 G I
-OPSF case
$ E5 u+ n+ F, {! @! s6 E0 T7 S( Q# t! j) q
( ?* d9 S$ A5 ~; aThank y0u
, p$ k) g6 p) ~+ e( d+ u! X% G4 [
|
评分
-
查看全部评分
|