單項(xiàng)選擇題On point-to-point networks, OSPF hello packets are addressed to which address?()

A.127.0.0.1
B.172.16.0.1
C.192.168.0.5
D.223.0.0.1
E.224.0.0.5
F.254.255.255.255


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which of the following IP addresses can be assigned to host devices?()

A.205.7.8.32/27
B.191.168.10.2/23
C.127.0.0.1
D.224.0.0.10
E.203.123.45.47/28
F.10.10.0.0/13

2.多項(xiàng)選擇題Which of the following are VLAN frame encapsulation types that may be configured on a Catalyst switch?()

A. VTP
B. ISL
C. CDP
D. 802.1Q
E. 802.1p
F. LLC

3.單項(xiàng)選擇題Which statement describes a spanning-tree network that has converged?()

A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.

4.多項(xiàng)選擇題What are three valid reasons to assign ports on VLANs on a switch?()

A. to make VTP easier to implement
B. to isolate broadcast traffic
C. to increase the size of the collision domain
D. to allow more devices to connect to the network
E. to logically group hosts according to function
F. to increase network security

5.單項(xiàng)選擇題A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()

A. Install anti-virus software on the student computers.
B. Put the faculty computers in a separate VLAN.
C. Power down the switches that connect to faculty computers when they are not in use.
D. Remove the student computers from the network and put them on a peer-to-peer network.
E. Create an access list that blocks the students from the Internet where the hacking tolls are located.

最新試題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:單項(xiàng)選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項(xiàng)選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:單項(xiàng)選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項(xiàng)選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項(xiàng)選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:單項(xiàng)選擇題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項(xiàng)選擇題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項(xiàng)選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項(xiàng)選擇題

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()

題型:多項(xiàng)選擇題