多項選擇題Which commands are required to properly configure a router to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?()

A. Router(config)#router ospf 1
B. Router(config)#router ospf 0
C. Router(config)#router ospf area 0
D. Router(config-router)#network 192.168.16.0 0.0.0.255 area 0
E. Router(config-router)#network 192.168.16.0 0.0.0.255 0
F. Router(config-router)#network 192.168.16.0 255.255.255.0 area 0


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements describe the advantages to the use of RIP over the use of OSPF?()

A. RIP requires less time to converge
B. RIP uses less bandwidth
C. RIP is less complex to configure
D. RIP demands fewer router resources
E. RIP has a more accurate metric

2.多項選擇題Which three elements must be used when you configure a router interface for vlan trunking?()

A. one IP network or subnetwork for each subinterface
B. subinterface numbering that matches vlan tages
C. subinterface encapsulation identifiers that match vlan tags
D. a management domain for each subinterface
E. one physical interface for each subinterface
F. one subinterface per vlan

3.多項選擇題Which of the following describes the roles of devices in a WAN?()

A. A CSU/DSU terminates a digital local loop
B. A modem terminates a digital local loop
C. A CSU/DSU terminates an analog local loop
D. A modem terminates an analog local loop
E. A router is commonly considered a DTE device
F. A router is commonly considered a DCE device

4.多項選擇題Which of the following are key characteristics of PPP?()

A. can be used over analog circuits
B. maps Layer 2 to Layer 3 address
C. encapsulates several routed protocols
D. supports IP only
E. provides error correction

5.多項選擇題Which can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interfaces.
B. Physically secure the interfaces.
C. Configure a virtual terminal password and login process.
D. Enter an access list and apply it to the terminal interfaces using the access-class command.
E. Create an access list and apply it to the terminal interfaces using the access-group command.