單項(xiàng)選擇題

Part of the routing table of router R1 is displayed below: 
S 62.99.153.0/24 [1/0] via 209.177.64.130
172.209.12.0/32 is subnetted, 1 subnets
D EX 172.209.1
[170/2590720] via 209.179.2.114, 06:47:28, Serial0/0/0.1239
62.113.17.0/24 is variably subnetted, 2 subnets, 2 masks
D EX 99.3.215.0/24
[170/27316] via 209.180.96.45, 09:52:10, FastEthernet11/0/0
[170/27316] via 209.180.96.44, 09:52:10, FastEthernet11/0/0
25.248.17.0/24
[90/1512111] via 209.179.66.25, 10:33:13, Serial0/0/0.1400001
[90/1512111] via 209.179.66.41, 10:33:13, Serial0/0/0.1402001
62.113.1.0/24 is variably subnetted, 12 subnets, 2 masks
D 62.113.1.227/32
[90/2611727] via 209.180.96.45, 10:33:13, FastEthernet1/0/0
[90/2611727] via 209.180.96.44, 10:33:13, FastEthernet1/0/0
S* 0.0.0.0/0 [1/0] via 209.180.96.14 
From analyzing the above command output, what is the administrative distance of the externalEIGRP routes?()

A.24
B.32
C.90
D.170
E.27316
F.None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題EIGRP is being used as the routing protocol on the company network. While troubleshooting somenetwork connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages.What causes these SIA routes?()

A.The neighboring router stops receiving ACK packets from this router
B.The neighboring router starts receiving route updates from this router
C.The neighboring router is too busy to answer the query (generally caused by high CPUutilization)
D.The neighboring router is having memory problems and cannot allocate the memory to processthe query or build the reply packet

2.多項(xiàng)選擇題In computer networking a multicast address is an identifier for a group of hosts that have joined amulticast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer 3) as IPv4 or IPv6 Multicast. Whichtwo descriptions are correct regarding multicast addressing?()

A、The first 23 bits of the multicast MAC address are 0x01-00-5E. This is a reserved value thatindicates a multicast application
B、The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application
C、To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address intothe last 24 bits of the MAC address. The high-order bit is set to 0
D、The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application

3.單項(xiàng)選擇題Which IOS command would you use to find out which networks are routed by a particular OSPF process()

A.show ip ospf
B.show ip route
C.show ip protocols
D.show ip ospf database
E.None of the other alternatives apply

4.單項(xiàng)選擇題At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?()

A.Layer 5
B.Layer 4
C.Layer 3
D.Layer 2
E.Layer 1

5.單項(xiàng)選擇題Which command would display OSPF parameters such as filters,default metric,maximum paths,and number of areas configured on a outer()

A.show ip protocol
B.show ip route
C.show ip ospfinterface
D.show ip ospf
E.show ip nterface
F.None of the other alternatives apply

最新試題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:?jiǎn)柎痤}

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:?jiǎn)柎痤}

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項(xiàng)選擇題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:?jiǎn)柎痤}