.65 through .126
.64 through .127
.66 through .128
.65 through .127
第1题:
A. 96.6.128.1 through 96.6.143.254
B. 96.6.128.128 through 96.6.134.254
C. 96.6.128.0 through 96.6.134.254
D. 96.6.128.1 through 96.6.159.254
第2题:
A. Router A will prefer the path through router B for network 172.20.0.0
B. Router A will prefer the path through router C for network 172.20.0.0
C. Packets from router D will prefer the path through router B for networks advertised by router A
D. Packets from r outer D will prefer the path through router C for networks advertised by router A
第3题:
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A.Replace the straight-through cable with a crossover cable
B.Change the subnet mask of the hosts to /25
C.Change the subnet mask of the hosts to /26
D.Change the address of Workstation A to 192.0.2.15
E.Change the address of Workstation B to 192.0.2.111
第4题:
What are the usable hosts on the 200.50.12.64/26 network?()
第5题:
Which of the following BEST describes a DAS?()
第6题:
What are the usable hosts on the 192.168.1.24/29 network?()
第7题:
What are the usable host on the 96.6.128.0/19 network?()
第8题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
第9题:
vpi 1 vci 200, vpi 3 vci 400
vpi 1 through 3, vci 200 through 400
vpi 1 vci 200 through 400, vpi 3 vci 200 through 400
vci 1 through 3, vpi 200 through 400
第10题:
Software virtualization through PowerVM and hardware virtualization through IBM Systems Director.
Hardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.
Software virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.
Hardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.
第11题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第12题:
.65 through .126
.64 through .127
.66 through .128
.65 through .127
第13题:
A. A collection of disks presented as storage to multiple servers through dedicated channels.
B. A collection of disks presented as storage to a single server through an existing network.
C. A collection of disks presented as storage to a single server through directly attached technologies.
D. A collection of disks presented as storage to multiple servers through an existing network.
第14题:
A.2through1001
B.1through1001
C.1through1002
D.2through1005
第15题:
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
第16题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第17题:
What is a Label-Switched Path?()
第18题:
With the command atm bulk-config test vc-range 1 3 200 400, what is the correct interpretation of the numeric values following the vc-range?()
第19题:
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
第20题:
a traffic engineered path
another name for a Frame Relay PVC
a bidirectional path through a network
a unidirectional path through a network
第21题:
96.6.128.1 through 96.6.143.254
96.6.128.128 through 96.6.134.254
96.6.128.0 through 96.6.134.254
96.6.128.1 through 96.6.159.254
第22题:
.128.1 through .143.254
.128.128 through .134.254
.128.0 through .134.254
.128.1 through .159.254
第23题:
A collection of disks presented as storage to multiple servers through dedicated channels.
A collection of disks presented as storage to a single server through an existing network.
A collection of disks presented as storage to a single server through directly attached technologies.
A collection of disks presented as storage to multiple servers through an existing network.
第24题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.