多項(xiàng)選擇題Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)()

A.It is locally significant.
B.It is globally significant.
C.It is needed to identify a unique instance of an OSPF database.
D.It is an optional parameter required only if multiple OSPF processes are running on the router.
E.All routers in the same OSPF area must have the same process ID if they are to exchange routing information.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is the maximum data rate specified for IEEE 802.11b WLANs?()

A.10Mbps
B.11Mbps
C.54Mbps
D.100Mbps

2.單項(xiàng)選擇題While troubleshooting a connectivity problem, a network administrator notices that a port status LED on a Cisco Catalyst series switch is alternating green and amber. Which condition could this indicate?()

A.The port is experiencing errors.
B.The port is administratively disabled.
C.The port is blocked by spanning tree.
D.The port has an active link with normal traffic activity.

3.單項(xiàng)選擇題On point-to-point networks, OSPF hello packets are addressed to which address?()

A.127.0.0.1
B.172.16.0.1
C.192.168.0.5
D.223.0.0.1
E.224.0.0.5
F.254.255.255.255

最新試題

Which command is used to display the collection of OSPF link states?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:?jiǎn)雾?xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題