A. 6, 9, 12, 18
B. 1, 2, 5.5, 6
C. 5.5, 6, 9, 11
D. 1, 2, 5.5, 11
您可能感興趣的試卷
你可能感興趣的試題
A. learning
B. listening
C. discarding
D. forwarding
A. server
B. client
C. tunnel
D. transparent
A. show mac-address
B. show arp
C. show table
D. show switchport
A. show command
B. debug command
C. configuration command
D. rommon command
A. 8 subnets, 31 hosts
B. 8 subnets, 32 hosts
C. 16 subnets, 30 hosts
D. 16 subnets, 32 hosts
E. A Class B address can't be subnetted into the fourth octet.
最新試題
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Which pairing reflects a correct protocol-and-metric relationship?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
What is the purpose of the cisco Vlan Trunking protocol?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
Which IPsec security protocol should be used when confidentiality is required?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Which command encrypts all plaintext passwords?()