多项选择题Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information?()

A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

2.多项选择题Which of the following IP addresses can be assigned to the host devices?()

A.205.7.8.32/27
B.191.168.10.2/23
C.127.0.0.1
D.224.0.0.10
E.203.123.45.47/28
F.10.10.0.0/13

3.多项选择题Identify the four valid IPv6 addresses.()

A.::
B.::192:168:0:1
C.2000::
D.2001:3452:4952:2837::
E.2002:c0a8:101::42
F.2003:dead:beef:4dad:23:46:bb:101

4.多项选择题What are three IPv6 transition mechanisms?()

A. 6to4 tunneling
B. VPN tunneling
C. GRE tunneling
D. ISATAP tunneling
E. PPP tunneling
F. Teredo tunneling

5.多项选择题Which two statements are true regarding EIGRP?()

A. Passiveroutes are in the process of being calculated by DUAL.
B. EIGRP supports VLSM, route summarization, and routing update authentication.
C. EIGRP exchanges full routing table information with neighboring routers with every update.
D. If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

6.多项选择题As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()

A. The data is moving from 10BASE-TX to 100BASE-TX.
B. The WAN encapsulation type has changed.
C. The data format has changed from analog to digital.
D. The source and destination hosts are in the same subnet.
E. The source and destination MAC addresses have changed.

7.多项选择题For what two purposes does the Ethernet protocol use physical addresses?()

A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

8.多项选择题What are three characteristics of the OSPF routing protocol?()

A. It converges quickly.
B. OSPF is a classful routing protocol.
C. It uses cost to determine the best route.
D. It uses the DUAL algorithm to determine the best route.
E. OSPF routers send the complete routing table to all directly attached routers.
F. OSPF routers discover neighbors before exchanging routing information.

9.多项选择题Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable?()

A.10.15.32.17
B.17.15.66.128
C.66.55.128.1
D.135.1.64.34
E.129.33.192.192
F.192.168.5.63

10.多项选择题Which two subnetworks would be included in the summarized address of 172.31.80.0 /20?()

A.172.31.17.4/30
B.172.31.51.16/30
C.172.31.64.0/18
D.172.31.80.0/22
E.172.31.92.0/22
F.172.31.192.0/18