How many useable hosts can you get from a /30 subnet mask?
How many useable hosts can you get from a /30 subnet mask?
what does it do?
In Unix, what is syslogd? And what does it do?
what would you have to configure on each router, whenever a new router was added to the network?
Without a CA, what would you have to configure on each router, whenever a new router was added to the network?
What traffic is allowed through the following access-list (select the best answer)?
What traffic is allowed through the following access-list (select the best answer)?
Access-list 2000 permit ip host 10.1.1.1 host 10.2.2.2
Access-list 2000 deny ip any any
Access-list 2000 permit ip any any log
what must policies match?
During IKE negotiation, how do two peers compare policies? And what must policies match? (Select all that apply)
Which route is the BEST BGP route?
Your BGP router receives two routes. Both of their next hops are reachable, neither has a weight set, RA has a larger local preference but a longer AS path than RB. Which route is the BEST BGP route?
What command is used to set the TACACS+ server and its encryption key, in the Cisco IOS?
What command is used to set the TACACS+ server and its encryption key, in the Cisco IOS?
Which of the following are correct?
You want to filter traffic using IOS firewall (CBAC). Your traffic is HTTP, TFTP, and TELNET. You create an inspection rule with the command “ip inspect name ccie tcp” and apply it to the Ethernet interface with the command “ip inspect ccie in”. Which of the following are correct? (Select all that apply)
where are failed super-user level access attempts stored?
In Unix, where are failed super-user level access attempts stored?