A.show ip eigrp topology
B.show ip eigrp adjacency
C.show ip eigrp routes
D.show ip eigrp database
E.show ip route eigrp
F.show ip eigrp forwarding
您可能感興趣的試卷
你可能感興趣的試題
A.255.255.255.255
B.224.0.0.6
C.FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF:FFF
D.FF02::10
E.224.0.0.10
F.FF02::5
A.Rl(config-if)#ipv6 default-information originate
B.Rl(config-router)#ipv6 rip 〈process-name〉 default-information only
C.Rl(config)#ipv6 route ::/0 null 0
D.Rl(config-if)#ipv6 rip 〈process-name〉 default-information only
E.Rl(config-router)#ipv6 rip route ;:/0 originate
F.Rl(config-router)#aggregate-address ::/0 summarize-routes
A.Ping 10.1.1.1 Data Pattern M
B.Ping 10.1.1.1 timeout 0
C.Ping 10.1.1.1 size 1500 df-bit
D.Ping 10.1.1.1 source loopback 0
E.Ping 10.1.1.1 size 1500
F.Ping 10.1.1.1 size 1500 Strict
A.RIP route 10.1.2.0/24
B.EIGRP route 10.1.2.0/24
C.RIP route 10.1.0.0/16
D.OSPF route 10.1.0.0/16
E.RIP route 10.0.0.0/16
F.OSPF route 10.1.2.0/24
A.OSPF topology table
B.OSPF interface table
C.OSPF routing information base
D.OSPF link-state database
E.OSPF adjacency table
F.OSPF neighbor table
最新試題
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Drag and drop each management protocol on the above to the correct category on the below.
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()