A.default gateway
B.DNS servers
C.FTP server
D.helper address
E.subnet mask
F.TFTP server
您可能感兴趣的试卷
你可能感兴趣的试题
A.It sends data in clear text format.
B.It is no longer supported on Cisco network devices.
C.It is more secure than SSH
D.It requires an enterprise license in order to be implemented.
E.It requires that the destination device be configured to support Telnet connections.
A.Switches take less time to process frames than hubs take.
B.Switches do not forward broadcasts.
C.Hubs can filter frames.
D.Using hubs can increase the amount of bandwidth available to hosts.
E.Switches increase the number of collision domains in the network.
A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10
A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.
A.FTP
B.Telnet
C.SMTP
D.DNS
E.HTTP
F.POP3
A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password
A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF
A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer
最新试题
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Which command is used to display the collection of OSPF link states?()
A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
How are VTP advertisements delivered to switches across the network?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which statement describes the rule of split horizon?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()