A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
您可能感興趣的試卷
你可能感興趣的試題
A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permitip any any
C.access-list 2500 deny tcp any host 192.168.1.1eq22
D.access-list 101 deny tcp any host 192.168.1.1
A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
Which routing protocols can be used within the enterprise network shown in the diagram? ()
A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP
A.A CSU/DSU terminates a digital local loop
B.A modem terminates a digital local loop
C.A CSU/DSU terminates an analog local loop
D.A modem terminates an analog local loop
E.A router is commonly considered a DTE device
F.A router is commonly considered a DCE device
A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer
A.192.168.10.80/28
B.192.168.10.80/29
C.192.168.10.96/28
D.192.168.10.96/29
A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
A.The router will use the static route.
B.The router will use the OSPF route.
C.The router will use the EIGRP route.
D.The router will load balance and use all three routes.
A.you can apply multiple access lists with the same protocol or in different…
B.you can config one access list,per direction,per layer 3 protocol
C.you can placeasmanyaccess lists as you want on any interface
D.you can apply ony one access list on any interface
最新試題
下列哪些是私有IP 地址的地址范圍?()
請(qǐng)參見圖示。下列哪組設(shè)備僅包含中間設(shè)備?()
請(qǐng)參見圖示。一臺(tái)主機(jī)正使用NAT 連接到Internet。下列哪三項(xiàng)IP 地址可實(shí)現(xiàn)此連接?()
PC 無(wú)法連接到任何遠(yuǎn)程網(wǎng)站,無(wú)法ping 通其默認(rèn)網(wǎng)關(guān),也無(wú)法ping 通本地網(wǎng)段中工作正常的打印機(jī)。以下哪項(xiàng)操作可以確認(rèn)此PC 上的TCP/IP 協(xié)議棧是否工作正常?()
請(qǐng)參見圖示。網(wǎng)絡(luò)中的所有設(shè)備均使用默認(rèn)配置。此拓?fù)渲写嬖诙嗌賯€(gè)廣播域?()
請(qǐng)參見圖示。從主機(jī)X 發(fā)出的到主機(jī)Y 的tracert 命令已成功。下列哪一項(xiàng)正確地反映了追蹤列表中顯示的中間網(wǎng)絡(luò)設(shè)備的順序?()
請(qǐng)參見圖示。主機(jī)A 嘗試與主機(jī)C 建立TCP/IP 會(huì)話。在嘗試期間,路由器Y 的FastEthernet 接口fa0/1捕獲到一個(gè)幀。捕獲的幀中包含源IP 地址為172.16.1.5而目的IP 地址為172.16.7.24的數(shù)據(jù)包。捕獲該幀時(shí),它的源MAC 地址是什么?()
請(qǐng)參見圖示。網(wǎng)絡(luò)中的所有設(shè)備均使用默認(rèn)配置。此拓?fù)渲行枰嗌賯€(gè)邏輯地址范圍?()
請(qǐng)參見圖示。某用戶想要查看當(dāng)前的配置。圖中所示為ipconfig/all 命令的輸出。從此輸出可以得到哪三項(xiàng)結(jié)論?()
OSI 模型的哪兩項(xiàng)功能在第2層實(shí)現(xiàn)?()