网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?()

  • A、The address is removed from the pool until the conflict is resolved.
  • B、The address remains in the pool until the conflict is resolved.
  • C、Only the IP detected by Gratuitous ARP is removed from the pool.
  • D、Only the IP detected by Ping is removed from the pool.
  • E、The IP will be shown, even after the conflict is resolved.

参考答案

更多 “Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?()A、The address is removed from the pool until the conflict is resolved.B、The address remains in the pool until the conflict is resolved.C、Only the IP detected by Gratuitous ARP is removed from the pool.D、Only the IP detected by Ping is removed from the pool.E、The IP will be shown, even after the conflict is resolved.” 相关考题
考题 Refer to the exhibit. Which of the following statements is true? () A. BGP NSF awareness is enabledB. SSO for BGP NSF capability is enabledC. BGP graceful restart awareness is enabledD. 10.11.1.187 is configured as an NSF-capable BGP neighbor

考题 Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

考题 Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()A. Dual StackB. NAT - PTC. 6to4 tunnelD. GRE tunnelE. ISATAP tunnel

考题 Refer to the exhibit. Which command would verify if PBR reacts to packets sourced from 172.16.0.0/16?() A. show ip routeB. show policy - mapC. show access - listsD. show route - map

考题 Refer to the exhibit. Which two Cisco IOS commands on R2 would verify its OSPF neighbor relationships?() A.show ip ospfB.show ip ospf interfaceC.show ip ospf neighborD.show ip ospf databaseE.show ip ospf statisticsF.show running - config begin router ospf

考题 Refer to the exhibit. Examine the partial configuration and the routing table excerpt. Which routes would be redistributed into OSPF area 1?() A. 10.10.10.16/28 onlyB. 10.10.10.16/28 and 10.10.10.64/26C. 10.10.10.16/28, 10.10.10.64/26, and 172.16.10.0/24D. 10.10.10.64/26 only

考题 Refer to the exhibit. Examine the partial configuration and the routing table excerpt. Which routes would be redistributed into OSPF area 1? () A. 10.10.10.16/28 onlyB. 10.10.10.16/28 and 10.10.10.64/26C. 10.10.10.16/28, 10.10.10 .64/26, and 172.16.10.0/24D. 10.10.10.64/26 only

考题 Refer to the exhibit. Which th ree commands should be used on router B1 to redistribute the EIGRP AS 10 routes into RIP?() A. router ripB. router eigrp 10C. redistribute eigrp 10D. redistribute ripE. default - metric 10000 100 255 1 1500F. default - metric 5

考题 Refer to the exhibit. The partial configuration for an OSPF ASBR and an Area 0 ABR is shown. Assume the OSPF configurations throughout the network are operable. Which statement about these configurations is true? ()A. The ASBR route - maps are basically useless, because there are no deny prefix - lists.B. LSA Type 5s wil l not be received by the ABR from the ASBR.C. The OSPF backbone will not learn any RFC 1918 addresses.D. The matched prefix - list addresses will be given a metric of 255, which is essentially unreachable.

考题 Refer to the exhibit. OSPF is running throughout the network. You want to minimize the propagation of LSAs into and out of A rea 1. Which OSPF feature would best achieve this goal? () A. stubB. totally stubbyC. NSSAD. totally NSSA

考题 Refer to the parti al configurations in the exhibit. What address is utilized for DR and BDR identification on Router1?() A. the serial 1/1 addressB. the serial 2/0 addressC. a randomly generated internal addressD. the configured router - id address

考题 Refer to the exhibit. Which statement is true? () A. Only traffic with a destination from 10.10.0.0/19 will be permitted.B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.C. Only traffic going to 10.10.0.0/19 will be permitted.D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.

考题 Refer to the exhibit. By default, when RTB passes BGP advertisements from RTA about network 192.168.2.0 to RTC, what address will be listed as the next - hop address? () A. 10.1.1.2B. 192.168.1.49C. 10.1.1.1D. 192.168.1.50

考题 Refer to the exhibit. Which two statement s are correct?() A. All the routes were redistributed into BGP from an IGPB. All the routes were originated by BGP with the network commandC. All six routes will be installed in the routing tableD. Four routes will be installed in the routing ta bleE. Two routes will be installed in the routing table

考题 Refer to the exhibit. What is the most appropriate summarization for these routes?() A.10.0.0.0/21B.10.0.0.0/22C.10.0.0.0/23D.10.0.0.0/24

考题 Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

考题 Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?() A.10.0.0.0B.10.0.0.254C.192.223.129.0D.192.223.129.254

考题 Refer to the exhibit.   What are three of the basic components of a VoIP network?()A、software voice applicationsB、multipoint control unit (MCU)  C、gatekeeper  D、call agentE、interactive voice response (IVR) systems  F、softphones

考题 Refer to the exhibit. The DHCP configuration that is shown is configured on a Cisco router. Whichstatement is true?()A、The router will distribute IP addresses from pool 1 until its addresses are exhausted. Then therouter will begin distributing addresses from pool 2B、The configuration is invalid because the DHCP options are global configuration commandsC、The configuration is incomplete until the DHCP pools are bound to the appropriate interface orinterfacesD、The router will choose which pool to use based upon the interface the DHCP request wasreceived on

考题 Which three of the following are consirered Fixed Asset Deprecation Rule Components ?()A、 International Deprecation MethodsB、 HeaderC、 Annual RulesD、 Rule ConventionsE、 Predefined Deprecation Methods

考题 单选题Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this RouterD?()A 10.1.1.2B 10.154.154.1C 172.16.5.1D 192.168.5.3

考题 单选题Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?()A As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.B Remote access management of this switch will not be possible without configuration change.C More VLANs will need to be created for this switch.D The switch will need a different IOS code in order to support VLANs and STP.

考题 多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

考题 单选题Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?()A Switch1B Switch2C Switch3D Switch4

考题 单选题Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()A switchport priority extend trustB switchport priority extend cos 2C switchport priority extend cos 11D mls qos cos 2E mls qos cos 2 override

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

考题 多选题Refer to the exhibit.   What are three of the basic components of a VoIP network?()Asoftware voice applicationsBmultipoint control unit (MCU)CgatekeeperDcall agentEinteractive voice response (IVR) systemsFsoftphones