A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005
您可能感興趣的試卷
你可能感興趣的試題
A. (config-if)#authentication ppp chap fallback ppp
B. (config-if)#authentication ppp chap pap
C. (config-if)#ppp authentication chap pap
D. (config-if)#ppp authentication chap fallback ppp
A. Bandwidth,Delay,and MTU
B. Bandwidth
C. Bandwidth and MTU
D. Bandwidth , MTU,Reliability,Delay,and Load
A. reflexive
B. extended
C. standard
D. dynamic
A. redundant
B. spanned
C. provisioned
D. converged
A. NCP
B. LCP
C. ISDN
D. DLCI
E. SLIP
A. 10.188.31.0/27
B. 10.188.31.0/26
C. 10.188.31.0/29
D. 10.188.31.0/28
E. 10.188.31.0/25
A. Configure the switch to be in VTP client mode.
B. Configure the switch to be in VTP domaint mode.
C. Configure the switch to be in VTP transparent mode.
D. Configure the switch to be in VTPv2.
A. proxy.
B. dual-stack
C. tunneling
D. dot1q
A. user EXEC mode
B. global configuration mode
C. privileged EXEC mode
D. auxiliary setup mode
A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
B. unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C. ports between switches should be configured in access mode so that vlans can span across the ports
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
最新試題
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
On which options are standard access list based?()
At which layer of the OSI model is RSTP used to prevent loops?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which IPsec security protocol should be used when confidentiality is required?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which command displays the CHAP authentication process as it occurs between two routers?()