多項選擇題A company is using 6to4 tunneling within their IPv6 network. Which two statements about this kindof tunneling are accurate?()

A.6to4 is a manual tunnel method
B.Prepending a reserved IPv6 code to the hexadecimal representation of 192.168.0.1 facilitates6to4 tunneling
C.Each 6to4 site receives a /48 prefix in a 6to4 tunnel
D.2002::/48 is the address range specifically assigned to 6to4
E.Prepending 0x2002 with the IPv4 address creates an IPv6 address that is used in 6to4tunneling


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Company network is implemting IPv6 into their existing IPv4 netwrok. Which statement is trueabout incorporating IPv6 into an already existing IPv4 network?()

A.Only OSPF version 3 can be utilized for routing IPv4 and IPv6
B.IPv4 and IPv6 networks can be routed simultaneously
C.IPv6 can be routed using the same routing protocol versions as IPv4
D.A router routing for IPv6 and IPv4 must convert IPv4 packets to IPv6 packets to route them
E.None of the other alternatives apply

2.多項選擇題To enable BGP tunneling over the IPv4 backbone, the IPv4 address 192.168.30.1 is convertedinto a valid IPv6 address. Which three IPv6 addresses are acceptable formats for the IPv4address? ()

A.192.168.30.1:0:0:0:0:0:0
B.0:0:0:0:0:0:192.168.30.1
C.::192.168.30.1
D.C0A8:1E01::
E.192.168.30.1::
F.::C0A8:1E01

3.單項選擇題The command "clear ipv6 ospf process" was issued on a router. What does this commandaccomplish?()

A.The route table is cleared. Then the OSPF neighbors are reformed
B.The OSPF adjacencies are cleared and initiated again
C.The OSPF database is repopulated and then the shortest path first (SPF) algorithm isperformed.
D.The shortest path first (SPF) algorithm is performed on the LSA database
E.None of the other alternatives apply

4.多項選擇題

Refer to the exhibit. What two statements are true?()

A.The IP address of the backup designated router (BDR) is FE80::205:5FFF:FED3:5808
B.This is the designated router (DR) on the FastEthernet 0/0 link
C.Interface FastEthernet 0/0 was configured with the ipv6 ospf 1 area 1 command
D.OSPF version 2 has been enabled to support IPv6
E.The output was generated by the show ip interface command

5.單項選擇題

Refer to the output. What IOS command produces this output?()

A.show ip ospf
B.show ip ospf interface
C.show ipv6 ospf interface
D.show ipv6 ospf

6.單項選擇題

Refer to the exhibit. Assume that Switch_A is active for the standby group and the standby devicehas only the default HSRP configuration. What conclusion is valid?()

A.If port Fa1/1 on Switch_A goes down, the standby device will take over as active
B.If the current standby device were to have the higher priority value, it would take over the role ofactive for the HSRP group
C.If Switch_A had the highest prioritynumber, it would not take over as active router
D.If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190

7.單項選擇題

Network topology exhibit:

In this network segment, the two routers on the network are configured for GLBP (Gateway LoadBalancing Protocol). What can be said about this?()

A.The hosts will have different default gateway IP addresses and different MAC addresses foreach rtouter
B.The default gateway address of each host should be set to the virtual IP address
C.The hosts will learn the proper default gateway IP address from Router R1
D.The default gateway address of each host should be set to the real IP address of the router
E.None of the other alternatives apply

8.多項選擇題

Refer to the exhibit. Which three statements accurately describe this GLBP topology?()

A.Router A is responsible for answering ARP requests sent to the virtual IP address.
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC addressof Router A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG

10.多項選擇題Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

A.It can be used to block bulk encryption attacks
B.It can be used to protect against denial of service attacks
C.Traffic originating from the router is considered trusted, so it is not inspected
D.Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
E.Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

最新試題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:問答題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:單項選擇題

Which statement about PPPoA configuration is correct?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:單項選擇題