A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160
您可能感興趣的試卷
你可能感興趣的試題
A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.
A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.
A.PPP
B.FDDI
C.Frame Relay PVC
D.NBMA
E.Frame Relay SVC
A. Microsegmentation decreases the number of collisions on the network.
B. if a switch receives a frame for an unkown destination,it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths,each switched aegment will contain one root bridge with all its ports in the forwarding state.All other switches in that broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.
最新試題
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
What is the default administrative distance of OSPF?()
Which IPsec security protocol should be used when confidentiality is required?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
At which layer of the OSI model is RSTP used to prevent loops?()