多項選擇題What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

A.default gateway
B.DNS servers
C.FTP server
D.helper address
E.subnet mask
F.TFTP server


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What are two characteristics of Telnet? (Choose two.)()

A.It sends data in clear text format.
B.It is no longer supported on Cisco network devices.
C.It is more secure than SSH
D.It requires an enterprise license in order to be implemented.
E.It requires that the destination device be configured to support Telnet connections.

2.單項選擇題Which of the following is true regarding the use of switches and hubs for network connectivity?()

A.Switches take less time to process frames than hubs take.
B.Switches do not forward broadcasts.
C.Hubs can filter frames.
D.Using hubs can increase the amount of bandwidth available to hosts.
E.Switches increase the number of collision domains in the network.

3.多項選擇題Which statements are true about EIGRP successor routes? (Choose two.)()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

4.多項選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)()

A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10

5.多項選擇題Why does the data communication industry use the layered OSI reference model? (Choose two.)()

A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.

8.多項選擇題The OSPF Hello protocol performs which of the following tasks? (Choose two.)()

A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF

9.多項選擇題A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

10.多項選擇題At which layers of the OSI model do WANs operate? (Choose two.)()

A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer

最新試題

Which statement is true, as relates to classful or classless routing?()

題型:單項選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:單項選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題