网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()

A.The subnet mask in use is 255.255.255.192.

B.The subnet mask in use is 255.255.255.128.

C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1

D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1

E.The LAN interface of the router is configured with one IP address.

F.The LAN interface of the router is configured with multiple IP addresses.


参考答案

更多 “ Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? () A.The subnet mask in use is 255.255.255.192.B.The subnet mask in use is 255.255.255.128.C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1E.The LAN interface of the router is configured with one IP address.F.The LAN interface of the router is configured with multiple IP addresses. ” 相关考题
考题 Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?()A. /61B. /62C. /63D. /64

考题 Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.

考题 You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network? (Select all valid answers)A. There are 254 usable subnets.B. There are 256 usable hosts per subnet.C. There are 50 usable subnets.D. There are 254 usable hosts per subnet.E. There are 24 usable hosts per subnet.F. There is one usable network.

考题 You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A. OSPFB. RIPC. BGPD. static

考题 Ezonexam has a Class C network and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.None of the above

考题 You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?() A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248E. None of the above

考题 Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

考题 Refer to the exhibit.Statements A,B,C,and D of ACL 10 have been entered in the shown order and appled to interface E0 inbound,to prevent all hosts(except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network.But as is,the ACL dose not restrict anyone from the network.How can the ACL statements be re-arranged so that the system works as intended?()A.CDBAB.DBACC.ACDBD.BADC

考题 Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?()A.The design will function as intendedB.Spanning-tree will need to be used.C.The router will not accept the addressing scheme.D.The connection between switches should be a trunk.E.The router interfaces must be encapsulated with the 802.1Q protocol.

考题 A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme?()A.255.255.255.0B.255.255.255.128C.255.255.252.0D.255.255.255.224E.255.255.255.192F.255.255.248.0

考题 Which of the following assumptions fails to describe the nature of vocabulary or vocabularylearning A.Words are best learned in context. B.A lexical item can be more than one word. C.All words in one language have equivalents in another. D.Learning a word includes learning its form, meaning and use.

考题 Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()A、As numbers must be changed to match on all the routers.B、Loopback interface must be configured so a DR is elected.C、The no auto-summary command is needed on Router A and Router C.D、Router B needs to have two network statements, one for each connected network.

考题 A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme?()A、255.255.255.0B、255.255.255.128C、255.255.252.0D、255.255.255.224E、255.255.255.192F、255.255.248.0

考题 One of the most important characteristics of OSPF is Multiple areas. Which statement best describes why this feature is such an important enhancement to earlier routing protocols?()A、The network domain, when divided into areas, allows for the use of both IANA classful addressing and private addressing.B、The use of multiple areas allows for the use of prioritization.C、All computation is kept within the area, with minimum communication between the areas,allowing the network to scale to larger sizes.D、It is easier to implement security.

考题 When one connection to a host fails in a full mesh network, which of the following is true?()A、All hosts can communicate.B、No hosts can communicate.C、Half of the hosts will lose communication.D、Only the two hosts between the failed connection will lose communication.

考题 You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()A、There are 254 usable subnets.B、There are 256 usable hosts per subnet.C、There are 50 usable subnets.D、There are 254 usable hosts per subnet.E、There are 24 usable hosts per subnet.F、There is one usable network.

考题 Which of the following IOS commands could you use to troubleshoot a router connectivity problem on an IP network?()A、show ip routeB、ipconfigC、tracertD、show interfacesE、tracerouteF、pingG、All of the above

考题 All client computers in your company run Windows 7 Enterprise. Users run Windows XP Mode guest virtual machines (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()A、Set each VM network adapter to Not connected.B、Configure each VM to use one Internal Network network adapter.C、Configure each VM to use one Shared Networking (NAT) network adapter.D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic, and remove all other Windows Firewall exceptions.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 多选题You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()AThere are 254 usable subnets.BThere are 256 usable hosts per subnet.CThere are 50 usable subnets.DThere are 254 usable hosts per subnet.EThere are 24 usable hosts per subnet.FThere is one usable network.

考题 多选题Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()AThe subnet mask in use is 255.255.255.192.BThe subnet mask in use is 255.255.255.128.CThe IP address 172.16.1.25 can be assigned to hosts in VLAN1DThe IP address 172.16.1.205 can be assigned to hosts in VLAN1EThe LAN interface of the router is configured with one IP address.FThe LAN interface of the router is configured with multiple IP addresses.

考题 单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A OSPFB RIPC BGPD static

考题 单选题Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?()A The design will function as intendedB Spanning-tree will need to be used.C The router will not accept the addressing scheme.D The connection between switches should be a trunk.E The router interfaces must be encapsulated with the 802.1Q protocol.

考题 单选题Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with RouterC?()A As numbers must be changed to match on all the routers.B Loopback interface must be configured so a DR is elected.C The no auto-summary command is needed on Router A and Router C.D Router B needs to have two network statements, one for each connected network.

考题 单选题You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?()A 255.255.255.192B 255.255.255.224C 255.255.255.240D 255.255.255.248E None of the above

考题 单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A /61B /62C /63D /64

考题 多选题A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? ()A255.255.255.0B255.255.255.128C255.255.252.0D255.255.255.224E255.255.255.192F255.255.248.0