A. Use of full duplex mode.
B. Creation of new collision domain.
C. Creation of new broadcast domain.
D. Addition of hub to the network.
E. Use of switches in the network.
F. Amount of ARP or IPX SAP traffic.
您可能感興趣的試卷
你可能感興趣的試題
A. Transport layer divides a data stream into segments & adds reliability & flow control information
B. Data link layer adds physical source & destination address & an FCS to the segment
C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
D. Packets are created when the network layers adds layers 3 address & control information to a segment
E. The presentation layer translated bits into bits into voltages for transmission across the physical link
A. The Boot IOS Code is Located in the NVRAM.
B. Check NVRAM for boot system Commands.
C. Bypass NVRAM Configurations.
D. Boot the IOS Code Located in ROM.
E. Perform a Password Recovery.
F. Bypass The Code In ROM.
A. show CHAP authentication
B. show interface serial 0
C. debug PPP authentication
D. debug CHAP authentication
E. show PPP authentication CHAP
A. 205.7.8. 32/27
B. 191.168. 10. 2/23
C. 127.0.0.1
D. 224.0.0.10
E. 203.123.45. 47/28
F. 10.10.0.0/13
A. 64 network and 4 hosts
B. 4 network and 64 hosts
C. 2 network and 62 hosts
D. 62 network and 2 hosts
A.TE1
B.TE2
C.NT1
D.NT2
A. 199.141.27.33
B. 199.141.27.112
C. 199.141.27.119
D. 199.141.27.126
E. 199.141.27.175
F. 199.141.27.208
A. The switch name must match the workgroup name of the local network.
B. The switch must be configured with an IP address and default gateway.
C. The remote workstations must have access to the management VLAN of the switch.
D. CDP must be enabled on the switch so that it can be located by other devices on the network.
A. show access-list
B. show ip route
C. show ip interface
D. show interface
E. show interface list
F. show ip interface brief
A. To restart the router.
B. To bypass the configuration in NVRAM.
C. To view the lost password.
D. To save the changes to the configuration.
E. To enter ROM Monitor mode.
最新試題
Which of the following if addresses can be assigned to host devices?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
Which of the following contribute to congestion on an Ethernet network?()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()
Which of the following statements regarding routed and routing protocols are true?()
Which statement describes the rule of split horizon?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?()