單項(xiàng)選擇題

Part of the routing table of router R1 is displayed below: 
S 62.99.153.0/24 [1/0] via 209.177.64.130
172.209.12.0/32 is subnetted, 1 subnets
D EX 172.209.1
[170/2590720] via 209.179.2.114, 06:47:28, Serial0/0/0.1239
62.113.17.0/24 is variably subnetted, 2 subnets, 2 masks
D EX 99.3.215.0/24
[170/27316] via 209.180.96.45, 09:52:10, FastEthernet11/0/0
[170/27316] via 209.180.96.44, 09:52:10, FastEthernet11/0/0
25.248.17.0/24
[90/1512111] via 209.179.66.25, 10:33:13, Serial0/0/0.1400001
[90/1512111] via 209.179.66.41, 10:33:13, Serial0/0/0.1402001
62.113.1.0/24 is variably subnetted, 12 subnets, 2 masks
D 62.113.1.227/32
[90/2611727] via 209.180.96.45, 10:33:13, FastEthernet1/0/0
[90/2611727] via 209.180.96.44, 10:33:13, FastEthernet1/0/0
S* 0.0.0.0/0 [1/0] via 209.180.96.14 
From analyzing the above command output, what is the administrative distance of the externalEIGRP routes?()

A.24
B.32
C.90
D.170
E.27316
F.None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題EIGRP is being used as the routing protocol on the company network. While troubleshooting somenetwork connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages.What causes these SIA routes?()

A.The neighboring router stops receiving ACK packets from this router
B.The neighboring router starts receiving route updates from this router
C.The neighboring router is too busy to answer the query (generally caused by high CPUutilization)
D.The neighboring router is having memory problems and cannot allocate the memory to processthe query or build the reply packet

2.多項(xiàng)選擇題In computer networking a multicast address is an identifier for a group of hosts that have joined amulticast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer 3) as IPv4 or IPv6 Multicast. Whichtwo descriptions are correct regarding multicast addressing?()

A、The first 23 bits of the multicast MAC address are 0x01-00-5E. This is a reserved value thatindicates a multicast application
B、The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application
C、To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address intothe last 24 bits of the MAC address. The high-order bit is set to 0
D、The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application

3.單項(xiàng)選擇題Which IOS command would you use to find out which networks are routed by a particular OSPF process()

A.show ip ospf
B.show ip route
C.show ip protocols
D.show ip ospf database
E.None of the other alternatives apply

4.單項(xiàng)選擇題At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?()

A.Layer 5
B.Layer 4
C.Layer 3
D.Layer 2
E.Layer 1

5.單項(xiàng)選擇題Which command would display OSPF parameters such as filters,default metric,maximum paths,and number of areas configured on a outer()

A.show ip protocol
B.show ip route
C.show ip ospfinterface
D.show ip ospf
E.show ip nterface
F.None of the other alternatives apply

最新試題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()

題型:多項(xiàng)選擇題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:?jiǎn)柎痤}

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:?jiǎn)柎痤}

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項(xiàng)選擇題

cisco ios command to interface dialer 0

題型:?jiǎn)柎痤}

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()

題型:多項(xiàng)選擇題