单项选择题X 纠错
A.to map all the devices on a network.
B.to display the current TCP/IP configuration values.
C.to see how a device MAC address is mapped to its IP address.
D.to see the path a packet will take when traveling to a specified destination.
E.to display the MTU values for each router in a specified network path from source to a destination.
你可能喜欢
单项选择题
A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess
单项选择题
A.denial of service
B.brute force
C.reconnaissance
D.Trojan horse
单项选择题
A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permit ip any any
C.access-list 2500 deny tcp any host 192.168.1.1 eq22
D.access-list 101 deny tcp any host 192.168.1.1
单项选择题
A.15 seconds
B.30 seconds
C.180 seconds
D.240 seconds
多项选择题
A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.Ituses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.
多项选择题
A.hub
B.router
C.switch
D.STP
E.subinterfaces
F.VLAN
单项选择题
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured
D.The PC has connectivity up to Layer 5 of the OSI model
E.The PC has the TCP/IP protocol stack correctly installed.
单项选择题
A.10.10.0.1
B.10.10.0.2
C.199.99.9.33
D.199.99.9.57
E.200.2.2.17
F.200.2.2.18
单项选择题
A.by encrypting all passwords passing through the router
B.by encrypting passwords in the plain text configuration file
C.by requiring entry of encrypted passwords for access to the device
D.by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E.by automatically suggesting encrypted passwords for use in configuring the router
多项选择题
A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.