成长值: 64660
|
本帖最后由 小乔 于 2020-5-27 10:27 编辑
* P3 {; \. Q) H/ @7 H2 T
9 j1 T, ?1 @$ E1 Refer to the exhibit.which route type is configured to reach the internet?- }9 u. |6 u2 ]- T& t* e- V
, `( w- |; c- D0 ~' P/ I& \A network route
" s2 b D1 h, \5 J! mB floating static route6 o, A; C. ?" X8 S1 X- G D3 Y
C host route
F* i* F3 R5 G& }: oD default route+ e' J( \; _4 P
5 t1 K; Z" c- k3 C# s: P2 How do traditional campus device management and Cisco DNA Center device management
6 N/ S( ^+ ~% N+ i8 K3 G! n( s: o( zdiffer in regards to deployment?
/ N' q& v# m' EA Cisco DNA Center device management can be implemented at a lower cost than most
1 r7 v3 p! r& J* ?2 d+ c9 s, Jtraditional campus device management options.
3 e9 m0 G F$ qB Traditional campus device management schemes can typically deploy patches and updates
* e5 o9 h4 c1 _" ]more quickly than Cisco DNA Center device management.
# T5 F- d9 d4 q6 ~- K! XC Cisco DNA Center device management can deploy a network more quickly than traditional
6 u0 ?5 w. O* k# V9 wcampus device management.5 w5 y3 B5 K8 T! U1 u, L: Z
D Traditional campus device management allows a network to scale more quickly than with Cisco
/ b8 e* B- S! _; W5 o% UDNA Center device management.
N" O9 ~& O7 E$ ^7 @9 g
( ?) P% H, O, B# F3 which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
/ x0 O. U0 q: [: A" n+ I8 `$ rA TKIP encryption
2 S- X v/ W- Z, _0 O2 ZB SAE encryption
0 O- k0 C, k4 ZC AES encryption3 s& o; _ c( o7 C& R& `
D scrambled encryption key# I1 ~$ N1 ^6 G) D$ P* h
. m/ [; I7 I+ z0 C
. h' f6 h2 G8 T2 P4 Refer to the exhibit.What two conclusions should be made about this configuration?(choose two)
% H" ?" S8 @' m: k1 V/ n
( F& v( d, T) D! e% ~; pA The root port is FastEthernet 2/1
/ X$ l7 M' r' m" A$ t3 @/ G+ ~B The spanning-tree mode is Rapid PVST+9 K9 G/ N) N) a( s' ]
C The designated port is FastEthernet 2/1- @, X6 `3 r4 R3 c4 j! N h' Q. c
D The spanning-tree mode is PVST+
+ @) S$ g( l Z9 b' N) Q; h9 C, Q" PE This is a root bridge
- A% f1 Y$ ?* [! Y# K
, _$ m' h: m$ h
. |' U: c) c- I9 x9 F3 V" O6 Y7 C2 X8 ~5 How do AAA operations compare regarding user identification,user services,and access$ }$ k! }' e7 b7 H
control?
& ~; d2 m# g1 h) I7 tA Authorization provides access control,and authentication tracks user services
0 i$ X! e7 m* R# GB Accounting tracks user services,and authentication provides access control.! } I/ H: i) W J7 p, j6 _
C Authorization identifies users,and authentication provides access control
4 G2 i7 Y: ]# Z1 r; zD Authentication identifies users,and accounting tracks user services! @8 ?+ a9 O" X; F; d
/ G6 _9 V! ` Q8 `8 l$ ]; n9 p1 K
. s3 c: n; C. i) w8 S
来源: CCNA(200-301)近期考试新题022 Q: v" O/ B8 Q# w
来源: CCNA(200-301)近期考试新题03 |
|