單項(xiàng)選擇題What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

A.permit all packets matching the first three octets of the source address to all destinations
B.permit all packets matching the last octet of the destination address and accept all source addresses
C.permit all packets from the third subnet of the network address to all destinations
D.permit all packets matching the host bits in the source address to all destinations
E.permit all packets to destinations matching the first three octets in the destination address


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()

A.Establish a direct link from the switch to all other switches in the network.
B.Assign the switch a higher MAC address than the other switches in the network have.
C.Configure the switch so that it has a lower priority than other switches in the network.
D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

2.單項(xiàng)選擇題What is the purpose of the command shown below? vtp password Fl0r1da()。

A.It is used to validate the sources of VTP advertisements sent between switches.
B.It is used to access the VTP server to make changes to the VTP configuration.
C.It allows two VTP servers to exist in the same domain, each configured with different passwords.
D.It is the password required when promoting a switch from VTP client mode to VTP server mode.
E.It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

3.多項(xiàng)選擇題What are two reasons a network administrator would use CDP? (Choose two.)()

A.to verify the type of cable interconnecting two devices
B.to determine the status of network services on a remote device
C.to obtain VLAN information from directly connected switches
D.to verify Layer 2 connectivity between two devices when Layer 3 fails
E.to obtain the IP address of a connected device in order to telnet to the device
F.to determine the status of the routing protocols between directly connected routers

4.單項(xiàng)選擇題Why will a switch never learn a broadcast address?()

A.Broadcasts only use network layer addressing.
B.A broadcast frame is never forwarded by a switch.
C.A broadcast address will never be the source address of a frame.
D.Broadcast addresses use an incorrect format for the switching table.
E.Broadcast frames are never sent to switches.

5.單項(xiàng)選擇題Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()

A.Set the SSID value in the client software to public.
B.Configure open authentication on the AP and the client.
C.Set the SSID value on the client to the SSID configured on the AP
D.Configure MAC address filtering to permit the client to connect to the AP

最新試題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項(xiàng)選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項(xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項(xiàng)選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項(xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項(xiàng)選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項(xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項(xiàng)選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項(xiàng)選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項(xiàng)選擇題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:單項(xiàng)選擇題