A. an OSPF update for network 192.168.0.0/16
B. a static router to network 192.168.10.0/24
C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next hop
D. a RIP update for network 192.168.10.0/24
E. a directly connected interface with an address of 192.168.10.254/24
F. a default route with a next hop address of 192.168.10.1
您可能感兴趣的试卷
你可能感兴趣的试题
A. Issue the show ip route command on Router A
B. Issue the show ip route command on Router B
C. Issue the show cdp neighbors command on Router B
D. Issue the show cdp neighbors detail command on Router C
E. Issue the show arp command on Router A
F. Issue the show arp command on Router B
A. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
B. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
C. C 192.168.1.0/24 is directly connected, Ethernet 0
D. R 192.168.5.0/24 [120/15] via 192.168.2.2,00:00:10,Serial0
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1
A. Only router can split boundaries(horizons)between concentric networks.
B. All distance vector protocols require fall routes that may cause momentary loops as the topology changes.
C. Networks can only remain fully converged if all information about routes is sent out all active interfaces.
D. Information about a route should not be sent back in the direction from which the original update came.
E. Each AS must keep routing tables converged to prevent dead routes from being advertised across the AS boundary.
A. Router#copy tftp flash
B. Router(config)#restore flash
C. Router(config)#repair flash
D. Router#copy flash run
E. Router>copy start flash
F. Router#copy start flash
A. 255.255.240.0
B. 255.255.248.0
C. 255.255.252.0
D. 255.255.254.0
E. 255.255.255.0
F. 255.255.255.192
A. IP address:192.168.20.14 Subnet Mask:255.255.255.248 Default Gateway:192.168.20.9
B. IP address:192.168.20.254 Subnet Mask:255.255.255.0 Default Gateway:192.168.20.1
C. IP address:192.168.20.30 Subnet Mask:255.255.255.248 Default Gateway:192.168.20.25
D. IP address:192.168.20.30 Subnet Mask:255.255.255.240 Default Gateway:192.168.20.17
E. IP address:192.168.20.30 Subnet Mask:255.255.255.240 Default Gateway:192.168.20.25
A. STP
B. VTP
C. GVRP
D. SNMP
E. DHCP
A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()
Router(config)#router ospf 1
Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
A. The process id is configured improperly
B. The OSPF area is configured improperly
C. The network wildcard mask is configured improperly
D. The network number is configured improperly
E. The AS is configured improperly
F. The network subnet mask is configuerd improperly
A. the IP address of the first Fast Ethernet interface
B. the IP address of the console management interface
C. the highest IP address among its active interfaces
D. the lowest IP address among its active interfaces
E. the priority value until a loopback interface is configured
最新试题
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
What is the default administrative distance of OSPF?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
What is the purpose of the cisco Vlan Trunking protocol?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which IPsec security protocol should be used when confidentiality is required?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which command displays the CHAP authentication process as it occurs between two routers?()