A. proxy.
B. dual-stack
C. tunneling
D. dot1q
您可能感興趣的試卷
你可能感興趣的試題
A. user EXEC mode
B. global configuration mode
C. privileged EXEC mode
D. auxiliary setup mode
A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
B. unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C. ports between switches should be configured in access mode so that vlans can span across the ports
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
A. an OSPF update for network 192.168.0.0/16
B. a static router to network 192.168.10.0/24
C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next hop
D. a RIP update for network 192.168.10.0/24
E. a directly connected interface with an address of 192.168.10.254/24
F. a default route with a next hop address of 192.168.10.1
A. session
B. network
C. physical
D. data link
E. transport
A. 172.16.16.0
B. 172.16.24.0
C. 172.16.0.0
D. 172.16.28.0
最新試題
Which command encrypts all plaintext passwords?()
Which command is used to display the collection of OSPF link states?()
At which layer of the OSI model dose PPP perform?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
At which layer of the OSI model is RSTP used to prevent loops?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Which IPsec security protocol should be used when confidentiality is required?()
What is the purpose of the cisco Vlan Trunking protocol?()