单项选择题
A. data link B. network C. physical D. transport
Which IPsec security protocol should be used when confi...
单项选择题Which IPsec security protocol should be used when confidentiality is required?()
A. PSK B. AH C. MD5 D. ESP
which command allows you to verify the encapsulation ty...
单项选择题which command allows you to verify the encapsulation type CISCO OR IETF for a frame relay link?()
A. show frame-relay map B. show frame-relay lmi C. show inter serial D. show frame-relay pvc
What is the alternative notation for the IPV6 address B...
单项选择题What is the alternative notation for the IPV6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?()
A. B514:82C3:0029::EC7A:0000:EC72 B. B514:82C3:0029:EC7A:EC72 C. B514:82C3::0029:EC7A:0:EC72 D. B514:82C3::0029:EC7A:EC72