What will the router consider the most reliable information about the path to that network?
A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?
Which two of these devices can be used as Cisco Easy VPN Remote hardware clients?
Which two of these devices can be used as Cisco Easy VPN Remote hardware clients?(Choose two)
Which two statements about using the CHAP authentication mechanism in a PPP link are
Which two statements about using the CHAP authentication mechanism in a PPP link are
Which four task items need to be performend for an effective risk assessment and to evaluate network posture?
Asseessing your network dor potential security risk (risk assessment should be an interal element of your network architecture. Which four task items need to be performend for an effective risk assessment and to evaluate network posture? (Choose four)
Which command allows you to verify the encapsulation type (CISCO or IETF) for a frame Relay link?
Which command allows you to verify the encapsulation type (CISCO or IETF) for a frame Relay link?
which type of record must be stored in the DNS server for that web server?
In order for a user to perform a reverse DNS lookup for a web server, which type of record must be stored in the DNS server for that web server?
which interfaces are affected by the acl?
When you are troubleshooting an acl isuue on a router, which command can help you to verify which interfaces are affected by the acl?
which one?
The Network Participation feature of Cisco IPS gathers all of these when it collects real-time data form IPS sensors except which one?
Which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
Which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
What will this configuration for an IDSM-2 module do?
What will this configuration for an IDSM-2 module do?
intrusion-detection module 6 management-port accaess-vlan 36 intrusion-detection module 6 data-port 1 capture
intrusion-detection module 6 data-port 1 capture allowed 1-10,36,124 !
vlan access-map IDSM-2 10
AAmatch ip address 150
AAaction forward capture
vlan access-map IDSM-2 20
AAmatch ip address 151
AAaction forward
!
vlan filter IDSM-2 vlan-list 1-10,36,124
access-list 150 permit tcp any 10.1.1.0 0.0.0.255
access-list 151 permit ip any any