网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()
A

this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined

B

If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user

C

if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user

D

login is the name of the method list being configured

E

if the tacacs+ server is unavailable, authentication will succeed automaticallyby default


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()Athis login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly definedBIf the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe userCif the tacacs+ server fails to respond then the local database on the router will be used to authenticate the userDlogin is the name of the method list being configuredEif the tacacs+ server is unavailable, authentication will succeed automaticallyby default” 相关考题
考题 ●Which of the following statements about object oriented database is not correct? (72) .(72) A.Each object has a unique object identify in the systemB.Encapsulation and inheritance are two important features of object oriented databaseC.A subclass can inherit the attributes and methods of all its superclassesD.A supereloss includes the attributes and methods at all subclasses

考题 Which of the following statements about object oriented databse is not correct?A. Each object has a unique object identity in the system.B.Encapsulation and inheritance are two important features of object oriented databasE.C.A subclass can inherit the attributes and methods of all its superclasses.D.A subclass includes the attributes and methods of all its subclasses.

考题 15 Which of the following statements about intangible assets are correct?1 If certain criteria are met, research expenditure must be recognised as an intangible asset.2 Goodwill may not be revalued upwards.3 Internally generated goodwill should not be capitalised.A 2 and 3 onlyB 1 and 3 onlyC 1 and 2 onlyD All three statements are correct

考题 19 Which of the following statements about intangible assets in company financial statements are correct accordingto international accounting standards?1 Internally generated goodwill should not be capitalised.2 Purchased goodwill should normally be amortised through the income statement.3 Development expenditure must be capitalised if certain conditions are met.A 1 and 3 onlyB 1 and 2 onlyC 2 and 3 onlyD All three statements are correct

考题 Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above

考题 Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.) A. In the DH key exchange process, the session key is never passed across the network.B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

考题 Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

考题 Which three statements are correct about Rate Limiters? ()(Choose three.) A. one-rate rate limitersB. two-rate rate limitersC. two-rate rate limiters is the defaultD. one-rate rate limiters is the defaultE. there is no default it must be configured

考题 Refer to the exhibit. Which two statements about the topologies shown are correct?() A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.

考题 In HDLC Protocol, when Supervisory Frame's type code is '00'.About the following statements, which is correct.A.Receive ReadyB.Receive not ReadyC.RejectD.Selective Reject

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements about Junos software packet handling are correct?()(Choose two.)A、The Junos OS applies service ALGs only for the first packet of a flow.B、The Junos OS uses fast-path processing only for the first packet of a flow.C、The Junos OS performs policy lookup only for the first packet of a flow.D、The Junos OS applies SCREEN options for both first and consecutive packets of a flow.

考题 Which two statements about layer 3 access designs are correct?()A、 IP address space is difficult to manage.B、 Broadcast and fault domains arc increasedC、 Convergence time is fractionally slower than STPD、 Limits on clustering and NIC teaming are removedE、 Fast uplink convergence is supported tor failover and fallback

考题 Which two statements about an interface configured with the asr-group command are correct?()A、The FWSM supports up to 16 asymmetric routing groups.B、If a matching packet is not found, the packet is dropped.C、Asymetric routing of return traffic is enabled.D、If a matching packet is found, the Layer 3 header is rewritten.E、If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.

考题 Which two statements about the configuration of the switch interface are correct (Choose two)()。A、The switchport belongs only to VLAN 2B、Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2C、The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2D、A network host can be connected to this interface

考题 Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.

考题 Which two statements about zoning are correct? ()A、Zoning increases security.B、DNS queries are used for software zoning.C、Software zoning is more secure than hardware zoning.D、When using zones and VSANs together, the zone is created first.E、Zoning requires that VSANs be established before it becomes operational.

考题 Which two statements about Network Attached Storage are correct?()A、Data is accessed using NFS or CIFS.B、Data is accessed at the block level.C、NAS is referred to as captive storage.D、Storage devices can be shared between users.E、A NAS implementation is not as fast as a DAS implementation.

考题 Which three statements are correct about Rate Limiters? ()(Choose three.)A、one-rate rate limitersB、two-rate rate limitersC、two-rate rate limiters is the defaultD、one-rate rate limiters is the defaultE、there is no default it must be configured

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 多选题Which two statements about layer 3 access designs are correct?()AIP address space is difficult to manage.BBroadcast and fault domains arc increasedCConvergence time is fractionally slower than STPDLimits on clustering and NIC teaming are removedEFast uplink convergence is supported tor failover and fallback

考题 多选题Which two statements about Junos software packet handling are correct?()(Choose two.)AThe Junos OS applies service ALGs only for the first packet of a flow.BThe Junos OS uses fast-path processing only for the first packet of a flow.CThe Junos OS performs policy lookup only for the first packet of a flow.DThe Junos OS applies SCREEN options for both first and consecutive packets of a flow.

考题 多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF

考题 多选题Which two statements about the configuration of the switch interface are correct (Choose two)()。AThe switchport belongs only to VLAN 2BInterface fa0/0 will be in both VLAN 1 (by default) and VLAN 2CThe exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2DA network host can be connected to this interface