A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.
您可能感兴趣的试卷
你可能感兴趣的试题
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
A. 4to6 routing
B. 6to4 routing
C. binary routing
D. dual-stack routing
E. NextGen routing
A. to provide routing to a local web server
B. to provide routing from an ISP to a stub network
C. to provide routing that will override the configured dynamic routing protocol
D. to provide routing to a destination that is not specified in the routing table and which is outside the local network
A. the OSPF route
B. the EIGRP route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
A. Lower the bridge priority number.
B. Change the MAC address of the switch.
C. Increase the VTP revision number for the domain.
D. Lower the root path cost on the switch ports.
E. Assign the switch an IP address with the lowest value.
A. show ip interface [interface] access-lists
B. show ip access-lists interface [interface]
C. show ip interface [interface]
D. show ip access-lists [interface]
A. The incorrect channel is configured on the client.
B. The client's IP address is on the wrong subnet.
C. The client has an incorrect pre-shared key.
D. The SSID is configured incorrectly on the client.
A. All TCP traffic is marked discard eligible.
B. All UDP traffic is marked discard eligible and a BECN is sent.
C. All TCP traffic is marked discard eligible and a BECN is sent.
D. All traffic exceeding the CIR is marked discard eligible.
最新试题
What is the purpose of the cisco Vlan Trunking protocol?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Which command encrypts all plaintext passwords?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which statement is true, as relates to classful or classless routing?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()