多項選擇題The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

A.172.22.243.127
B.172.22.243.191
C.172.22.243.190
D.10.16.33.98
E.10.17.64.34
F.192.168.1.160


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題A network administrator needs to configure port security on a switch.which two statements are true?()

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

2.多項選擇題Which two statements apply to dynamic access lists?()

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.

3.多項選擇題Which two of these are characteristics of the 802.1Q protocol?()

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.

4.多項選擇題Which two data link layers are supported by cisco ios software for IPv6?()

A.PPP
B.FDDI
C.Frame Relay PVC
D.NBMA
E.Frame Relay SVC

5.多項選擇題Which three statements accurately describe layer 2 Ethernet switches?()

A. Microsegmentation decreases the number of collisions on the network.
B. if a switch receives a frame for an unkown destination,it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths,each switched aegment will contain one root bridge with all its ports in the forwarding state.All other switches in that broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.

最新試題

How are VTP advertisements delivered to switches across the network?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題