A. Legacy DDR can use port information to define interesting traffic.
B. Legacy DDR can configure multiple dialer configurations on the same interface.
C. Legacy DDR can use ACLs to define interesting traffic.
D. HDLC or PPP can be used to encapsulate ISDN D channel information.
E. The BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.
F. Dialer profiles cannot use extended ACLs to define interesting traffic.
您可能感興趣的試卷
你可能感興趣的試題
A. 16kb/s
B. 64kb/s
C. 128kb/s
D. 144kb/s
E. 192kb/s
F. 256kb/s
A. PPP and ATM
B. PPP and SDLC
C. ATM and HDLC
D. SDLC and HDLC
A. X25
B. Frame Relay
C. ATM
D. ISDN
E. ATX
F. None of the above
A. TK1(config-if)# encapsulation hdlc ansi
B. TK1(config-if)# encapsulation ppp
C. TK1(config-if)# encapsulation LAPD
D. TK1(config-if)# encapsulation frame-relay ietf
E. TK1(config)#encapsulation ppp
A. HDLC
B. NCP
C. PAP
D. LAPD
E. LAPB
F. None of the above
最新試題
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
Which command is used to display the placement and direction of an IP access control list on a router?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()