多項(xiàng)選擇題While troubleshooting some connectivity issues,you issue the “show ip ospf database”in order to ex amine the link state database. Which three of the statements below are true regarding the OSPF link state database()

A.Each router has an identical link state database.
B.External routes are imported into a separate link state database.
C.Syn chronization of link state databases is maintained via floodingo f LSAs.
D.Information in the link state database is used to build a routing table by calculating a shortest-path tree.
E.By default,link state databases are refreshede very 10 minutes in the absence of topology changes.


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()

A.The neighboring router stops receiving ACK packets from this router.
B.The neighboring router starts receiving route updates from this router.
C.The neighboring router is too busy to answer the query(generally caused by high CPU utilization).
D.The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

3.單項(xiàng)選擇題At which lay er of the OSI model does the Spanning Tree Protocol (STP) operate at()

A.Lay er 5
B.Lay er 4
C.Lay er 3
D.Lay er 2
E.Lay er 1

4.多項(xiàng)選擇題Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()

A.The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.
B.The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C.The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.
D.The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

最新試題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:?jiǎn)柎痤}

Which three statements accurately describe IOS Firewall configurations?()

題型:多項(xiàng)選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:?jiǎn)柎痤}

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:?jiǎn)雾?xiàng)選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:?jiǎn)柎痤}

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:?jiǎn)柎痤}

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:?jiǎn)柎痤}