成长值: 59320
|
本帖最后由 小乔 于 2020-5-27 10:27 编辑
# r+ n% l6 u& Q7 r0 w0 c: O* l8 {4 O! h) Z
1 Refer to the exhibit.which route type is configured to reach the internet?
9 y* X( ?+ [# M% I
8 f# p* ]: S% I$ q
A network route. v. f4 ^7 o+ c
B floating static route( \- x' m# u% U" K
C host route; P& W$ b y* \! U# _6 Y) O
D default route5 T4 W7 X0 p- M+ x- u
6 u* m$ |! _, I
2 How do traditional campus device management and Cisco DNA Center device management) _3 s. N) z1 J" A: |- R; ~
differ in regards to deployment?
1 P; N: u) X0 E2 t8 RA Cisco DNA Center device management can be implemented at a lower cost than most- Y$ i E9 q" f5 T& _
traditional campus device management options.
* [- g9 J- r) E Y( V4 X0 xB Traditional campus device management schemes can typically deploy patches and updates* z3 | P, Z6 y4 m. T
more quickly than Cisco DNA Center device management.
- X# i: p, h% H0 y; \' Z/ vC Cisco DNA Center device management can deploy a network more quickly than traditional% b* n( n a$ a1 T& m% z6 C
campus device management. `. ~4 ^0 \' @1 f( P" Y
D Traditional campus device management allows a network to scale more quickly than with Cisco' X1 ~9 h2 v' O
DNA Center device management.8 z1 _5 D6 r7 w8 f7 }$ ^( _; i
4 V0 H+ P9 G) w5 O" ~+ p
3 which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?0 k+ Q; y# z" n' {
A TKIP encryption3 x& x2 O1 w/ Y+ w- D9 k5 o. M+ w
B SAE encryption/ \( J' @1 ?/ l
C AES encryption
1 R' [0 v) }; j) y C3 VD scrambled encryption key4 r2 B! e. G( y9 ]$ a7 l( ]
0 t6 z1 P+ b2 R8 @
; P( ?5 @3 |' G1 T4 Refer to the exhibit.What two conclusions should be made about this configuration?(choose two)4 N" T$ q0 f7 ?$ u/ r: P) I
/ C4 b* [# }/ Y1 b/ E3 r9 p% F- C3 q+ GA The root port is FastEthernet 2/1, X' p4 @ B8 k
B The spanning-tree mode is Rapid PVST+6 K1 P1 F5 V; s- S: h# h3 r. p: r# `
C The designated port is FastEthernet 2/16 _: u/ X6 b, g$ Z. @9 }0 v$ Z
D The spanning-tree mode is PVST+7 W# @+ h8 p/ j8 i+ V
E This is a root bridge- V, y! B+ a! `
$ r, A; t h: u2 C, B i2 D L, c3 U% h3 y& I; j
5 How do AAA operations compare regarding user identification,user services,and access0 W+ U% Q V: m
control?
) v; r# a+ f7 u8 N* C1 n" KA Authorization provides access control,and authentication tracks user services
1 u0 p1 ^4 Q! M( s; yB Accounting tracks user services,and authentication provides access control.- f2 }& u' p1 \+ Y8 s- q! ]
C Authorization identifies users,and authentication provides access control
- w8 I: r, s5 B4 TD Authentication identifies users,and accounting tracks user services
0 h' e6 g9 ^% r4 a$ R* A
4 M5 Z7 l$ ~" [. t' w* i( z
- C2 x1 d5 v+ ]$ i) z J* I来源: CCNA(200-301)近期考试新题02
5 o' Z; ]4 [9 q8 L+ _, n. Z5 P7 }来源: CCNA(200-301)近期考试新题03 |
|