單項選擇題What is a characteristic of Network Time Protocol?()

A.NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based  on the input time.
B.NTP authentication verifies the source,not the recipient.
C.NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D.Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E.A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. You are setting up a 2-gigabit EtherChannel. Following IEEE standards, the exhibit shows your configuration in a local switch1. However, EtherChannel is not coming up. Which one of these statements could be a possible reason?()

A. EtherChannel is only available in Cisco equipment. 
B. The customer side is supposed to be running PAgP, which is a Cisco standard. 
C. PAgP is not an IEEE standard. VRRP should be used. 
D. The configuration on switch1 needs to be modified to use LACP. 

3.多項選擇題Which two statements are true about bandwidth guarantee?()

A.When congestion is present,the priority command doesn’t allow exceeding the allocated rate
B.When congestion isn’t present,the priority command doesn’t allow exceeding the allocated rate
C.When congestion is present,the priority command allows exceeding the allocated rate
D.When congestion isn’t present,the priority command allows exceeding the allocated rate

最新試題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to determine thebest received BPDU?()

題型:單項選擇題

Which of the following is true about the MPLS header and its EXP field size?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:單項選擇題

Choose two commands that are required to enable multicast on a router, when it is known that thereceivers use a specific functionality of IGMPv3.()

題型:多項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題

Which three message types are valid PIMv2 message types?()

題型:多項選擇題

How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()

題型:單項選擇題

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

題型:單項選擇題