A.127.0.0.1
B.192.168.0.5
C.223.0.0.1
D.172.16.0.1
E.224.0.0.5
F.254.255.255.255.255
您可能感興趣的試卷
你可能感興趣的試題
A. IGRP has a faster update timer.
B. IGRP has a lower administrative distance.
C. RIP has a higher metric value for that route.
D. The IGRP route has fewer hops.
E. The RIP path has a routing loop.
A. All entries in the topology database will be included on each router.
B. All routers in the same OSPF area will have one topology database.
C. The Dijkstra algorithm is used in the creation of the topology database.
D. LSA packets are used to update and maintain the topology database.
A. It is needed to identify a unique instance of an OSPF database.
B. It is an optional parameter only necessary if multiple OSPF processes are used.
C. It is locally significant.
D. It is globally insignificant
E. All routers in the same OSPF area must have the same process ID to exchange routing information.
A. Has a maximum hop count of 25
B. Can differentiate between internal and external routes
C. Uses a 32-bit metric
D. Can maintain only one routing table
E. Need all networks to use the same subnet mask
F. Supports only one routed protocol
A. Every 5 minutes
B. Every 90 seconds
C. Every 60 seconds
D. Every 30 seconds
最新試題
What feature of a networks switch allows an administrative to create separate broadcast domains?()
Which characteristics are representative of a link-state routing protocol?()
Which of the following statements regarding routed and routing protocols are true?()
What is a global command?()
What does a configuration Register Setting of 0x2105 indicate to the Router? ()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
Which statement describes the rule of split horizon?()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which of the following if addresses can be assigned to host devices?()