.24 through .48
.24 through .32
.25 through .30
.35 through .31
第1题:
A. 96.6.128.1 through 96.6.143.254
B. 96.6.128.128 through 96.6.134.254
C. 96.6.128.0 through 96.6.134.254
D. 96.6.128.1 through 96.6.159.254
第2题:
A. Router A will prefer the path through router B for network 172.20.0.0
B. Router A will prefer the path through router C for network 172.20.0.0
C. Packets from router D will prefer the path through router B for networks advertised by router A
D. Packets from r outer D will prefer the path through router C for networks advertised by router A
第3题:
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A.Replace the straight-through cable with a crossover cable
B.Change the subnet mask of the hosts to /25
C.Change the subnet mask of the hosts to /26
D.Change the address of Workstation A to 192.0.2.15
E.Change the address of Workstation B to 192.0.2.111
第4题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第5题:
What is a Label-Switched Path?()
第6题:
With the command atm bulk-config test vc-range 1 3 200 400, what is the correct interpretation of the numeric values following the vc-range?()
第7题:
What are the usable host on the 96.6.128.0/19 network?()
第8题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
第9题:
vpi 1 vci 200, vpi 3 vci 400
vpi 1 through 3, vci 200 through 400
vpi 1 vci 200 through 400, vpi 3 vci 200 through 400
vci 1 through 3, vpi 200 through 400
第10题:
.24 through .48
.24 through .32
.25 through .30
.35 through .31
第11题:
.128.1 through .143.254
.128.128 through .134.254
.128.0 through .134.254
.128.1 through .159.254
第12题:
A collection of disks presented as storage to multiple servers through dedicated channels.
A collection of disks presented as storage to a single server through an existing network.
A collection of disks presented as storage to a single server through directly attached technologies.
A collection of disks presented as storage to multiple servers through an existing network.
第13题:
A. A collection of disks presented as storage to multiple servers through dedicated channels.
B. A collection of disks presented as storage to a single server through an existing network.
C. A collection of disks presented as storage to a single server through directly attached technologies.
D. A collection of disks presented as storage to multiple servers through an existing network.
第14题:
A.2through1001
B.1through1001
C.1through1002
D.2through1005
第15题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第16题:
Which of the following BEST describes a DAS?()
第17题:
What are the usable hosts on the 192.168.1.24/29 network?()
第18题:
What are the usable hosts on the .128.0/19 network?()
第19题:
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
第20题:
a traffic engineered path
another name for a Frame Relay PVC
a bidirectional path through a network
a unidirectional path through a network
第21题:
96.6.128.1 through 96.6.143.254
96.6.128.128 through 96.6.134.254
96.6.128.0 through 96.6.134.254
96.6.128.1 through 96.6.159.254
第22题:
Software virtualization through PowerVM and hardware virtualization through IBM Systems Director.
Hardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.
Software virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.
Hardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.
第23题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第24题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.