多項選擇題Which of the following routing protocols are less likely prone routing loops and network reachability problems when used in discontiguous networks?()

A. IGRP
B. CDP
C. OSPF
D. RIP v1
E. RIP v2
F. EIGRP


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which of the following OSPF commands, when used together, will put the network 192.168.10.0/24 into OSPF area 0?()

A. Router(config-router)# network 192.168.10.0 0.0.0.255 0
B. Router(config-router)# network 192.168.10.0 0.0.0.255 area 0
C. Router(config-router)# network 192.168.10.0 255.255.255.0 area 0
D. Router(config)# router ospf 0
E. Router(config)# router ospf 1

2.單項選擇題What is the reason for configuring a passive interface on a router?()

A. Allows interfaces to share common IP addresses.
B. Allows an interface to remain up without the aid of keepalives.
C. Allows a router to send routing and not receive updates via that interface.
D. Allows a routing protocol to forward updates that is missing its IP address.
E. Allows a router to receive routing updates on an interface but not send updates via that interface.

3.多項選擇題Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()

A. Spanning Tree Protocol
B. Shortest path first tree
C. Link-state advertisements (LSA)
D. Hold-down timers
E. Split horizon
F. VRRP

4.單項選擇題What parameters must you specify when you enable EIGRP routing?()

A. The broadcast address, and AS number
B. The network number and AS number
C. EIGRP routing, network number and passive interface
D. EIGRP routing, network number, and AS

5.單項選擇題Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()

A. Connected subnet numbers
B. Register administrative subnet masks
C. IP address mask
D. Autonomous system number
E. Metric weights

6.單項選擇題Which one of the following parameters is the very first thing that needs to be configured as part of the IGRP routing process?()

A. The wild card mask
B. The IP address
C. The IP address mask
D. The metric weights
E. The Autonomous System number

7.多項選擇題Which of the following describe private IP addresses?()

A. Addresses chosen by a company to communicate with the Internet.
B. Addresses that cannot be routed through the public Internet.
C. Addresses that can be routed through the public Internet.
D. A scheme to conserve public addresses.
E. Addresses licensed to enterprise or ISPs by an Internet registry organization.

10.單項選擇題A Cisco router has been configured with the following command:IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0his is an example of what type of NAT?()

A. Static NAT
B. Dynamic NAT
C. Dynamic NAT with overload
D. Port Address Translation
E. None of the above

最新試題

Which of the following describe router functions?()

題型:多項選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:單項選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項選擇題

What is the subnetwork address for a host with IP address 201.100.5.68/28?()

題型:單項選擇題

Which command is used to display the placement and direction of an IP access control list on a router?()

題型:單項選擇題

New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()

題型:單項選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:單項選擇題