多項選擇題Which of the following IP addresses can be assigned to the host devices?()

A.205.7.8.32/27
B.191.168.10.2/23
C.127.0.0.1
D.224.0.0.10
E.203.123.45.47/28
F.10.10.0.0/13


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Identify the four valid IPv6 addresses.()

A.::
B.::192:168:0:1
C.2000::
D.2001:3452:4952:2837::
E.2002:c0a8:101::42
F.2003:dead:beef:4dad:23:46:bb:101

2.多項選擇題What are three IPv6 transition mechanisms?()

A. 6to4 tunneling
B. VPN tunneling
C. GRE tunneling
D. ISATAP tunneling
E. PPP tunneling
F. Teredo tunneling

3.多項選擇題Which two statements are true regarding EIGRP?()

A. Passiveroutes are in the process of being calculated by DUAL.
B. EIGRP supports VLSM, route summarization, and routing update authentication.
C. EIGRP exchanges full routing table information with neighboring routers with every update.
D. If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

4.多項選擇題As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()

A. The data is moving from 10BASE-TX to 100BASE-TX.
B. The WAN encapsulation type has changed.
C. The data format has changed from analog to digital.
D. The source and destination hosts are in the same subnet.
E. The source and destination MAC addresses have changed.

5.多項選擇題For what two purposes does the Ethernet protocol use physical addresses?()

A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

最新試題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項選擇題