單項(xiàng)選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1

Figure 2
Trouble Ticket Statement
Client 1 is not able to reach the WebServer. Initial troubleshooting shows that DSW1 can ping the Fa0/1interface of R4 but not the s0/0/0/0.34 interface.
Configurationon DSW1
router eigrp 10
network 10.1.4.4 0.0.0.0
network 10.2.1.1 0.0.0.0
network 10.2.4.13 0.0.0.0
no auto-summary
Configurationon DSW2
router eigrp 10
network 10.1.4.8 0.0.0.0
network 10.2.2.1 0.0.0.0
network 10.2.4.14 0.0.0.0
no auto-summary
Configurationon R4
router eigrp 10
network 10.1.4.5 0.0.0.0
no auto-summary
redistribute ospf 1 metric 100 10 255 1 1500 route-map EIGRP_to_OSPF!
router ospf 1
network 10.1.1.8 0.0.0.0 area 34
redistribute eigrp 10 subnets!
route-map EIGRP→OSPF
match ip address 1!
access-list 1 permit 10.0.0.0 0.255.255.255
access-list 1 permit 209.0.0.0 0.255.255.255
On Which device is the fault condition located?()

A.DSW1
B.DSW2
C.Client 1
D.R4


您可能感興趣的試卷

你可能感興趣的試題

最新試題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項(xiàng)選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:?jiǎn)柎痤}

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:?jiǎn)柎痤}

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:?jiǎn)雾?xiàng)選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項(xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:?jiǎn)柎痤}