In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()
A . to identify valid numbers for incoming calls
B . to define the type of ISDN switch at the central office
C . to specify the list of outgoing phone numbers used by the router
D . to associate a dial configuration with a physical interface
E . to define interesting traffic that will enable the link
相似题目
-
Which of the following accurately represents the functionality of a lightweight access point configured to operate in sniffer ap mode?()
A . client traffic allowed, data captured on all channels
B . client traffic allowed, data captured on a single channel
C . no client traffic allowed, data captured on a single channel
D . no client traffic allowed, data captured on all channel
-
In IPCCX, skills can be assigned to which of the following configuration objects?()
A . resources
B . Skill Groups
C . competence levels
D . Resource Grou
-
An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()
A . Weight
B . Origin code
C . AS_Path
D . Local_Pref
-
The hardware and software configurations for vPC+ are similar to that of traditional vPC. What are the differences in the configuration of vPC+? ()
A . FabricPath switch ID must be configured under the vPC domain.
B . Virtual switch ID of vPC+ must be configured under FabricPath domain.
C . On Cisco Nexus 7000 Series Switch, F1 interfaces must be used as the vPC+ peer links.
D . The vPC+ peer link must be configured as a Cisco FabricPath core port (switchport mode fabricpath).
E . FabricPath subswitch ID must be configured under the vPC domain.
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
Which of the following are true about SSIDs configured in the ADU?()
A . SSIDs are not case sensitive.
B . SSIDs must be listed in the same order in the ADU as they are in the access point.
C . A maximum of three SSIDs may be configured.
D . SSIDs may have a maximum of 16 characters.
-
Utterance is based on ();it is the realization of the abstract meaning of a sentence in a real situation of communication,or simply in a context.
-
What is the action of "pop" in the context of MPLS switching?()
A . It removes the top label in the MPLS label stack.
B . It adds a top label in MPLS label stack.
C . It replaces the top label in the MPLS label stack with another value.
D . It replaces the top label in the MPLS label stack with a set of labels.
E . None of above.
-
In the context of GMPLS,LMP stands for().
A . Loop Management Protocol
B . Label Management Protocol
C . Load Management Protocol
D . Link Management Protocol
E . None of above
-
What is the use of an "all configuration" backup in Cisco UCS?()
A . Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
B . Can only be used on the fabric interconnect on which it was created
C . Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
D . Can be used to match firmware versions between 6120 and 6140 during a migratio
-
The correct meaning of a lexical item in a given context is____.
A . the one provided in a dictionary
B . the one which best fits the context
C . the central or core meaning of the item
D . the one which is assumed to be correct
-
The correct meaning of a lexical item in a given context is__.
A . the one provided in a dictionary
B . the one which best fits the context
C . the central or core meaning of the item
D . the one which is assumed to be correct
-
In the context of MPLS Traffic engineering, TE path calculation is conducted by().
A . TE middle point
B . TE tail end
C . TE head end
D . All TE nodes along the path
E . Independent server
-
In the context of Advanced Power Virtualization, the shared pool refers to which of the following?()
A . A pool of physical memory that can be used by any partition
B . A pool of physical processors that can be used by any virtual or dedicated partition
C . A pool of physical memory that can be used by multiple Micro-Partitions
D . A pool of physical processors that can be used by multiple Micro-Partitio
-
Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()
A . Dedicated paths between sending and receiving hosts are established.
B . Multiple subnetwork broadcast addresses are created.
C . Multiple ARP tables are needed.
D . The decrease in the number of collision domains.
E . Broadcast domains are enhanced.
F . Additional bandwidth is used to connect hosts.
-
In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()
A . It adds the VPN label into the top label in the MPLS label stack
B . It replaces the top label in the MPLS label stack with a VPN label and propagates
C . It replaces the bottom label in the MPLS label stack with a VPN label and propagates
D . It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packets
E . None of above
-
In high context culture, there is more of a quiet understanding of what is going on and less is said about it, as in the end we should be just ‘understood’.
-
In high-context culture, the mass of information is vested in the explicit code.
-
In which of the following contexts could we use the idiom “ 按图索骥 ” ?
-
In high-context cultures, information is provided through _____, the use of _____, and even _____.
-
In low context cultures, the verbal message contains most of the information and very little is shown in the _____ or the _____.
-
In the context of the reading, what does the word reserving most closely mean?
-
Click the Exhibit button.In the exhibit, what is the function of the configuration statements?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/9e4bb10af679f8698024701bdbe32cdc.jpg' />
A. This section is where you define all chassis clustering configuration.
B. This configuration is required for members of a chassis cluster to talk to each other.
C. You can apply this configuration in the chassis cluster to make configuration easier.
D. This section is where unique node configuration is applied.
-
In the context of object-oriented software engineering a component contains()
A.attribute and operations
B.instances of each class
C.roles for each actor(device or user)
D.set of collaborating classes