Discussion of one Question of 400-101
本帖最后由 小乔 于 2017-3-3 16:28 编辑Q.130
Which TWO statements are the About PfR to true? (The Choose TWO)
A.It Manages the traffic classes
B.It Provides A narrower route Scope of Control Within last OER.
C.It route Provides Intelligent Control ON A per-file application Basis.
D. It contains split tunneling and spoke-to-spoke links.
E.It always prefers the least cost path.
Answer: AC not AE
from Cisco Site
http://www.cisco.com/c/en/us/products/ios- Nx-os-software / performance-routing-pfr / index.html
Performance Routing (PfR) delivers e WA intelligent path control for application-aware routing across th N. PfR provides:
[*]Dynamic selection of the best path for application-based business policies
[*]
Benefits:
[*]Reduced WAN operating expenses
[*]Full utilization of all WAN bandwidth by passive overhead traffic based on load, circuit costs, and path preference
[*]Improved application performance with per-application best-path selection based on delay, loss, and jitter measurements
[*]Improved application availability
[*]Simple setup
Across paths for full utilization of bandwidth with improved network availability[*]
Benefits:
[*]Reduced WAN operating expenses
[*]Full utilization of all WAN bandwidth by passive overhead traffic based on load, circuit costs, and path preference
[*]Improved application performance with per-applicatio n best-path selection based on delay, loss, and jitter measurements
[*]Improved application availability
[*]Simple setup
[*]
Q121:
aaa authentication login default group radius group tacacs+ local
Refer to the exhibit.If R1 contacts the RADIUS server but is unable to find
the user name in the server database,how will R1 respond?
A.It will attempt to contact the TACACS+ server
B.It will prompt the user to enter a new username
C.It will attempt to authenticate the user against the local database
D.It will deny the user access
Spoto answer is D while Braindump answer is A
then the right answer is A refereeing to Cisco
http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html
Method List Examples
Suppose the system administrator has decided on a security solution where all interfaces will use the same authentication methods to authenticate PPP connections. In the RADIUS group, R1 is contacted first for authentication information, then if there is no response, R2 is contacted. If R2 does not respond, T1 in the TACACS+ group is contacted; if T1 does not respond, T2 is contacted. If all designated servers fail to respond, authentication falls to the local username database on the access server itself. To implement this solution, the system administrator would create a default method list by entering the following command:
<a name="wp1000947" style="margin: 0px; padding: 0px; border-width: 0px; border-style: initial; border-color: initial; font-variant-numeric: inherit; font-stretch: inherit; line-height: inherit; font-family: CiscoSans, Arial, sans-serif; vertical-align: baseline; color: rgb(0, 127, 171); word-break: break-all; word-wrap: break-word; background-color: rgb(255, 255, 255);">
aaa authentication ppp default group radius group tacacs+ local
页:
[1]