多項(xiàng)選擇題the network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two valid reasons for adopting ipv6 over ipv4?()

A. telnet access does not require a password
B. nat
C. no broadcast
D. chanage of destination address in the ipv6 header
E. chanage of source address in the ipv6 header
F. autoconfiguration


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three approaches can be used while migrating from an IPV4 addressing scheme to an IPV6 scheme.()

A. statically map IPV4 address to IPV6 addresses
B. configuration IPv4 tunnels between IPV6 islands
C. use DHCPv6 to map IPV4 addresses to IPV6 addresses
D. use proxying and translation to translate IPV6 packets into IPV4 packets
E. configure IPV6 directly
F. enable dual-stack routing

2.多項(xiàng)選擇題Which two subnetworks would be included in the summarized address of 172.31.80.0 /20?()

A.172.31.17.4/30
B.172.31.51.16/30
C.172.31.64.0/18
D.172.31.80.0/22
E.172.31.92.0/22
F.172.31.192.0/18

3.多項(xiàng)選擇題What two statistics appear in show frame-relay map output?()

A. The number of FECN packets that are received by the router
B. The number of BECN packets that are received by the router
C. The ip address of the local router
D. The value of the local DLCI
E. The status of the PVC that is configured on the router

4.多項(xiàng)選擇題It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit.Which of the following processes are required to accomplish this task?()

A. configure static frame relay map entries for each subinterface network.
B. remove the ip address from the physical interface
C. create the virtual interfaces with the interface command
D. configure each subinterface with its own IP address
E. disable split horizon to prevent routing loops between the subinterface networks
F. encapsulate the physical interface with multipoint PPP

5.多項(xiàng)選擇題Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

A.show inventory
B.show flash:filesys
C.dirflash:include chassis
D.show diag
E.show controllers

6.多項(xiàng)選擇題Which two statements are characteristics of a distance vector routing protocol?()

A. RIP is an example of distance vector routing protocols.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks.
E. Convergence is usually faster than with link state protocols
F. Each router has its own view of the topology

7.多項(xiàng)選擇題The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160

8.多項(xiàng)選擇題A network administrator needs to configure port security on a switch.which two statements are true?()

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

9.多項(xiàng)選擇題Which two statements apply to dynamic access lists?()

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.

10.多項(xiàng)選擇題Which two of these are characteristics of the 802.1Q protocol?()

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.

最新試題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:?jiǎn)雾?xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:?jiǎn)雾?xiàng)選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:?jiǎn)雾?xiàng)選擇題

What is the default administrative distance of OSPF?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:?jiǎn)雾?xiàng)選擇題