What are the basic configuration steps to enable IS - IS?()A、Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B、Configure the net sy stem - id and the network net - id commands und

题目

What are the basic configuration steps to enable IS - IS?()

  • A、Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.
  • B、Configure the net sy stem - id and the network net - id commands under routerisis.
  • C、Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.
  • D、Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.
  • E、Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

相似考题
参考答案和解析
正确答案:A
更多“What are the basic configuration”相关问题
  • 第1题:

    A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()

    A. Erase flash.

    B. Restart the switch.

    C. Delete the VLAN database.

    D. Erase the running configuration.

    E. Erase the startup configuration.

    F. Modify the configuration register.


    参考答案:B, C, E

  • 第2题:

    What will a router do during startup if a configuration file is not located in NVRAM?()

    • A、it will search for the configuration file in the locations specified by boot system commands.
    • B、it will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.
    • C、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.
    • D、it will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.
    • E、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

    正确答案:C

  • 第3题:

    What are three components of a scheduler?()

    • A、Forwarding Class
    • B、Priority
    • C、TOS Marking
    • D、Buffer Size
    • E、RED Configuration

    正确答案:B,D,E

  • 第4题:

    爱立信OAM的IP地址由哪个脚本定义()。

    • A、Site BasiC.xml
    • B、Site Equipment.xml
    • C、Site Installation.xml
    • D、Site Configuration.xml

    正确答案:C

  • 第5题:

    When will an "all configuration" backup be imported into the Cisco UCS Manager?()

    • A、 During the initial configuration from the console
    • B、 Once the basic configuration has been applied
    • C、 To restore the configuration on a secondary fabric interconnect
    • D、 To upgrade the firmware on a replacement fabric interconnect

    正确答案:B

  • 第6题:

    What IBM pre-sale resource has technical information and general configuration details for System x, BladeCenter, Intellistation, System x storage products and options in both Adobe PDF, and online HTML?()

    • A、ServerProven
    • B、System x Sales Configuration Aid (xSCA)
    • C、Configuration & Options Guide - (COG)
    • D、Standalone Solutions Configuration Tool (SSCT)

    正确答案:C

  • 第7题:

    单选题
    When will an "all configuration" backup be imported into the Cisco UCS Manager?()
    A

     During the initial configuration from the console

    B

     Once the basic configuration has been applied

    C

     To restore the configuration on a secondary fabric interconnect

    D

     To upgrade the firmware on a replacement fabric interconnect


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizardthat performs similar configuration functions?()
    A

    aaa configuration commands and the SDM Basic Firewall wizard

    B

    setup exec command and the SDM Security Audit wizard

    C

    auto secure exec command and the SDM One-Step Lockdown wizard

    D

    Cisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    What is the name of the file that is used to provide the configuration setting in unattended mode?()
    A

    Answer file.

    B

    Startup file.

    C

    Unattended configuration file.

    D

    Network file.


    正确答案: C
    解析: Answer file is used to provide the configuration settings during unattended installation of Windows 2000 professional.

  • 第10题:

    单选题
    You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()
    A

    GPT disks and basic disks

    B

    GPT disks and dynamic disks

    C

    MBR disks and basic disks

    D

    MBR disks and dynamic disks


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    What is a benefit of NTLMSSP over basic authentication?()
    A

     basic cannot be used in transparent proxy mode

    B

     basic requiresreauthentication with every new domain

    C

     NTLMSSP is compatible with open LDAP

    D

     NTLMSSP is more secure than basic


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    What we need in life is divided into _____ according to this article.
    A

    the basic necessities and luxury

    B

    many kinds of need such as food, clothing and houses

    C

    four groups, namely, the basic necessities, luxury, reliable income and future expense

    D

    the basic necessities and reliable income


    正确答案: B
    解析:
    推理题。人的需要分为基本需要和高级需要。

  • 第13题:

    What is a benefit of NTLMSSP over basic authentication?() 

    • A、 basic cannot be used in transparent proxy mode
    • B、 basic requiresreauthentication with every new domain
    • C、 NTLMSSP is compatible with open LDAP
    • D、 NTLMSSP is more secure than basic

    正确答案:D

  • 第14题:

    What does the command show | compare rollback 1 display?()

    • A、the difference between the current candidate configuration and the candidate configuration from one commit ago
    • B、the difference etween the current active configuration and the active configuration from the one commit ago
    • C、the difference between the current active configuration and the active configuration from one commit ago
    • D、the difference between the current candidate configuration and the archived configuration from one commit ago

    正确答案:D

  • 第15题:

    Your customer requires you to supply a configuration or proposal in xl format.  What tool is available? ()

    • A、IBM Standalone Solutions Configuration Tool (SSCT )
    • B、Server Proven
    • C、Configuration Options Guide (COG)
    • D、xREF (System X reference)

    正确答案:C

  • 第16题:

    A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()

    • A、Erase flash.
    • B、Restart the switch.
    • C、Delete the VLAN database.
    • D、Erase the running configuration.
    • E、Erase the startup configuration.
    • F、Modify the configuration register.

    正确答案:B,C,E

  • 第17题:

    What command will display the network configuration of an Ethernet adapter?()

    • A、lsdev
    • B、lscfg
    • C、entstat
    • D、ifconfig

    正确答案:D

  • 第18题:

    What does the command show | compare rollback 1 display?()

    • A、the difference between the current candidate configuration and the candidate configuration from one commit ago
    • B、the difference between the current active configuration and the current candidate configuration
    • C、the difference between the current active configuration and the active configuration from one commit ago
    • D、the difference between the current candidate configuration and the archived configuration from one commit ago

    正确答案:D

  • 第19题:

    单选题
    What does the command show | compare rollback 1 display?()
    A

    the difference between the current candidate configuration and the candidate configuration from one commit ago

    B

    the difference between the current active configuration and the current candidate configuration

    C

    the difference between the current active configuration and the active configuration from one commit ago

    D

    the difference between the current candidate configuration and the archived configuration from one commit ago


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Click the Exhibit button. In the exhibit, what is the function of the configuration statements?()
    A

    This section is where you define all chassis clustering configuration.

    B

    This configuration is required for members of a chassis cluster to talk to each other.

    C

    You can apply this configuration in the chassis cluster to make configuration easier.

    D

    This section is where unique node configuration is applied.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    What does the command show | compare rollback 1 display?()
    A

    the difference between the current candidate configuration and the candidate configuration from one commit ago

    B

    the difference etween the current active configuration and the active configuration from the one commit ago

    C

    the difference between the current active configuration and the active configuration from one commit ago

    D

    the difference between the current candidate configuration and the archived configuration from one commit ago


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()
    A

    Use the transport security mode and specify None for transport client credential type.

    B

    Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.

    C

    Use the message security mode and specify Basic for the transport client credential type.

    D

    Use the transportWithMessageCredential security mode and specify None for the transport client credential type.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    What are three components of a scheduler?()
    A

    Forwarding Class

    B

    Priority

    C

    TOS Marking

    D

    Buffer Size

    E

    RED Configuration


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    多选题
    A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?()
    A

    Erase flash.

    B

    Restart the switch.

    C

    Delete the VLAN database.

    D

    Erase the running configuration.

    E

    Erase the startup configuration.

    F

    Modify the configuration register.


    正确答案: F,E
    解析: 暂无解析