Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.
Configure the net sy stem - id and the network net - id commands under routerisis.
Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.
Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.
Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
第1题:
A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.
第2题:
The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()
第3题:
What are the four basic Data Flow steps of an ETL process?
在ETL过程中四个基本的过程分别是什么?
第4题:
What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()
第5题:
A customer with IPCC Express Standard reports that a script using the Database steps is not working. What is the most likely root cause?()
第6题:
What is the effect of using the service password-encryption command?()
第7题:
Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)
第8题:
You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user‘s Windows credentials to your Web application. These credentials must be encrypted.What should you do? ()
A. Enable Anonymous access. Enable Integrated Windows authentication.
B. Enable Anonymous access. Enable Basic authentication.
C. Disable Anonymous access. Enable Integrated Windows authentication.
D. Disable Anonymous access. Enable Basic authentication.
第9题:
What are two steps that must be taken when mitigating a worm attack?()
第10题:
Which CLI mode allows you to make configuration changes?()