單項(xiàng)選擇題In order to maintain security, with which hop count are IPv6 neighbor discovery packets sent?()

A.0
B.1
C.255
D.256


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two tunneling techniques support IPv6 multicasting?()

A.6to4
B.6over4
C.ISATAP
D.6PE
E.GRE

2.單項(xiàng)選擇題You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one? ()

A. Both support normal and extended VLAN ranges.
B. ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.
C. ISL encapsulates the original frame.
D. Both support native VLANs.
E. 802.1Q does not encapsulate the original frame.

3.單項(xiàng)選擇題How will EIGRPv6 react if there is an IPv6 subnet mask mismatch between the Global Unicast addresseson a point-to-point link?()

A.EIGRPv6 will form a neighbor relationship.
B.EIGRPv6 will not form a neighbor relationship.
C.EIGRPv6 will form a neighbor relationship, but with the log MSG: "EIGRPv6 neighbor not on a commonsub net."
D.EIGRPv6 will form a neighbor relationship, but routes learned from that neighbor will not be installed inthe routing table.

4.多項(xiàng)選擇題Which three of these statements about Dynamic Trunking Protocol are correct?()

A. It supports autonegotiation for both ISL and IEEE 802.1Q trunks.
B. It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.
C. It is a point-to-multipoint protocol.
D. It is a point-to-point protocol.
E. It is not supported on private VLAN ports or tunneling ports.

最新試題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:單項(xiàng)選擇題

You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()

題型:單項(xiàng)選擇題

What is the correct command to set the router ID for an OSPFv3 process?()

題型:單項(xiàng)選擇題

What is also called Type 0 authentication in OSPF on Cisco Routers?()

題型:單項(xiàng)選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項(xiàng)選擇題

Which of these statements about penultimate hop popping are true?()

題型:多項(xiàng)選擇題

When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridgepriority be changed to?()

題型:單項(xiàng)選擇題

Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()

題型:單項(xiàng)選擇題

In GLBP,which router will answer on client ARP requests?()

題型:單項(xiàng)選擇題

Which two EIGRP options will limit a query domain?()

題型:多項(xiàng)選擇題