List of questions
Related questions
Question 207 - 300-410 discussion
Refer to the exhibit.
A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messagesi which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?
A.
no terminal monitor
B.
(config)#terminai no monitor
C.
#terminal no monitor
D.
(config)#no terminal monitor
Your answer:
0 comments
Sorted by
Leave a comment first