單項選擇題A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?()

A.a directly connected interface with an address of 192.168.10.254/24
B.a static route to network 192.168.10.0/24
C.a RIP update for network 192.168.10.0/24
D.an OSPF update for network 192.168.0.0/16
E.a default route with a next hop address of 192.168.10.1
F.a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which of the following describes the roles of devices in a WAN? (Choose three.)()

A.A CSU/DSU terminates a digital local loop.
B.A modem terminates a digital local loop.
C.A CSU/DSU terminates an analog local loop.
D.A modem terminates an analog local loop.
E.A router is commonly considered a DTE device.
F.A router is commonly considered a DCE device.

2.多項選擇題Which of the following statements are true regarding bridges and switches? (Choose 3.)()

A.Switches are primarily software based while bridges are hardware based.
B.Both bridges and switches forward Layer 2 broadcasts.
C.Bridges are frequently faster than switches.
D.Switches have a higher number of ports than most bridges.
E.Bridges define broadcast domains while switches define collision domains.
F.Both bridges and switches make forwarding decisions based on Layer 2 addresses.

3.多項選擇題Which of the following describe private IP addresses? (Choose two.)()

A.addresses chosen by a company to communicate with the Internet
B.addresses that cannot be routed through the public Internet
C.addresses that can be routed through the public Internet
D.a scheme to conserve public addresses
E.addresses licensed to enterprises or ISPs by an Internet registry organization

4.單項選擇題In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?()

A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use

5.單項選擇題There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that the router will use to find an IOS during reload?()

A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM

6.多項選擇題What are some of the advantages of using a router to segment the network? (Choose two.)()

A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.

7.單項選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.

8.單項選擇題What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5?()

A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.

9.多項選擇題What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()

A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service

10.多項選擇題Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK

最新試題

On which options are standard access list based?()

題型:單項選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項選擇題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which statement is true, as relates to classful or classless routing?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題

What is the default administrative distance of OSPF?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題