What are the usable hosts on the 200.50.12.64/26 network?()
第1题:
A. 96.6.128.1 through 96.6.143.254
B. 96.6.128.128 through 96.6.134.254
C. 96.6.128.0 through 96.6.134.254
D. 96.6.128.1 through 96.6.159.254
第2题:
A. Router A will prefer the path through router B for network 172.20.0.0
B. Router A will prefer the path through router C for network 172.20.0.0
C. Packets from router D will prefer the path through router B for networks advertised by router A
D. Packets from r outer D will prefer the path through router C for networks advertised by router A
第3题:
A.2through1001
B.1through1001
C.1through1002
D.2through1005
第4题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第5题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第6题:
Which of the following BEST describes a DAS?()
第7题:
What are the usable hosts on the 192.168.1.24/29 network?()
第8题:
What are the usable host on the 96.6.128.0/19 network?()
第9题:
a traffic engineered path
another name for a Frame Relay PVC
a bidirectional path through a network
a unidirectional path through a network
第10题:
.128.1 through .143.254
.128.128 through .134.254
.128.0 through .134.254
.128.1 through .159.254
第11题:
A collection of disks presented as storage to multiple servers through dedicated channels.
A collection of disks presented as storage to a single server through an existing network.
A collection of disks presented as storage to a single server through directly attached technologies.
A collection of disks presented as storage to multiple servers through an existing network.
第12题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
第13题:
A. A collection of disks presented as storage to multiple servers through dedicated channels.
B. A collection of disks presented as storage to a single server through an existing network.
C. A collection of disks presented as storage to a single server through directly attached technologies.
D. A collection of disks presented as storage to multiple servers through an existing network.
第14题:
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.
第15题:
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A.Replace the straight-through cable with a crossover cable
B.Change the subnet mask of the hosts to /25
C.Change the subnet mask of the hosts to /26
D.Change the address of Workstation A to 192.0.2.15
E.Change the address of Workstation B to 192.0.2.111
第16题:
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
第17题:
4,11,30,67,( )
第18题:
What is a Label-Switched Path?()
第19题:
With the command atm bulk-config test vc-range 1 3 200 400, what is the correct interpretation of the numeric values following the vc-range?()
第20题:
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
第21题:
96.6.128.1 through 96.6.143.254
96.6.128.128 through 96.6.134.254
96.6.128.0 through 96.6.134.254
96.6.128.1 through 96.6.159.254
第22题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第23题:
.65 through .126
.64 through .127
.66 through .128
.65 through .127