成长值: 64000
|
本帖最后由 小乔 于 2020-5-27 10:27 编辑 ; k* d% ?$ c) L
# _8 R0 T7 p! N, @. ?2 [
1 Refer to the exhibit.which route type is configured to reach the internet?3 M$ \6 W- r k* b
0 U. ]* l, ^) k( E) {1 \# `
A network route, q$ D [' }' Q; Y
B floating static route
2 T! |8 P" V& g% f/ _) `. _0 TC host route$ u9 T5 P6 j. Q& y7 V/ r- `( X9 P
D default route
2 n- \1 F9 W# g, m2 j; ~1 d
" E* n1 f4 i' g8 S( i2 How do traditional campus device management and Cisco DNA Center device management
+ K& \7 g- u; `; v$ N8 _0 Q! @1 Xdiffer in regards to deployment?8 g% J- J$ m1 ^: W' ]% w
A Cisco DNA Center device management can be implemented at a lower cost than most
0 a# E0 L) ^) l1 [traditional campus device management options.: O( L* D. ^5 `
B Traditional campus device management schemes can typically deploy patches and updates
5 f+ Z2 P4 A7 ~/ xmore quickly than Cisco DNA Center device management.
1 H3 X3 B9 n4 e2 |. d4 w6 ^* }C Cisco DNA Center device management can deploy a network more quickly than traditional
) Y& u! o: r$ w$ h' _% {8 Ocampus device management.
5 G) s, B' ]% P8 [; }4 c$ hD Traditional campus device management allows a network to scale more quickly than with Cisco, i: b3 b$ T7 R; c8 T& e" Y
DNA Center device management.4 ?2 E7 h# X, t
1 `: Y- f3 I4 i. x# U- a3 which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?1 L8 c) P, w2 W+ b3 O2 x
A TKIP encryption
% N) k; _9 `, H/ ?B SAE encryption
) Y* ]0 E! \# I, zC AES encryption
, T$ s. H. e+ RD scrambled encryption key
/ J9 \6 e/ H% ~& O! a) [% r3 W- }0 L- `+ L; s: {2 y( R) K& K& p
d) _& Y+ f$ X9 g4 Refer to the exhibit.What two conclusions should be made about this configuration?(choose two)
7 u4 O4 ~( m6 r6 |9 e' {, b
1 Y1 k1 i- }+ C! E0 a
A The root port is FastEthernet 2/1: ~3 M- s6 L& b) s; v4 H
B The spanning-tree mode is Rapid PVST+, ?2 v7 [% z8 L
C The designated port is FastEthernet 2/1. P) [) U% I& X% \# {
D The spanning-tree mode is PVST+: @$ T9 ~5 Q% H6 f9 L
E This is a root bridge
& M% f" Y8 ?4 r) d' |! J* ~
. \5 O: h: m; c) X8 |
4 r. C7 l* f4 e5 How do AAA operations compare regarding user identification,user services,and access
9 E+ V8 v1 b) h. J8 @& ?) dcontrol?6 P5 E$ R3 J* o$ n8 L) i8 B/ o2 R
A Authorization provides access control,and authentication tracks user services# ]8 Q" h, f% X2 ?& R
B Accounting tracks user services,and authentication provides access control.
* e0 P9 F/ A4 U. z% uC Authorization identifies users,and authentication provides access control
8 u' l$ {& o; j( G8 {& F$ \D Authentication identifies users,and accounting tracks user services) H/ [% k$ s+ u; M" j) d' N2 _0 H" u
" e6 ?8 |; p4 h! u! M1 i# M
: H3 ?' S! P$ T H! `# i* ]来源: CCNA(200-301)近期考试新题02. p# O! G. M- _, c
来源: CCNA(200-301)近期考试新题03 |
|