A.6to4 is a manual tunnel method
B.Prepending a reserved IPv6 code to the hexadecimal representation of 192.168.0.1 facilitates6to4 tunneling
C.Each 6to4 site receives a /48 prefix in a 6to4 tunnel
D.2002::/48 is the address range specifically assigned to 6to4
E.Prepending 0x2002 with the IPv4 address creates an IPv6 address that is used in 6to4tunneling
您可能感興趣的試卷
你可能感興趣的試題
A.Only OSPF version 3 can be utilized for routing IPv4 and IPv6
B.IPv4 and IPv6 networks can be routed simultaneously
C.IPv6 can be routed using the same routing protocol versions as IPv4
D.A router routing for IPv6 and IPv4 must convert IPv4 packets to IPv6 packets to route them
E.None of the other alternatives apply
A.192.168.30.1:0:0:0:0:0:0
B.0:0:0:0:0:0:192.168.30.1
C.::192.168.30.1
D.C0A8:1E01::
E.192.168.30.1::
F.::C0A8:1E01
A.The route table is cleared. Then the OSPF neighbors are reformed
B.The OSPF adjacencies are cleared and initiated again
C.The OSPF database is repopulated and then the shortest path first (SPF) algorithm isperformed.
D.The shortest path first (SPF) algorithm is performed on the LSA database
E.None of the other alternatives apply
Refer to the exhibit. What two statements are true?()
A.The IP address of the backup designated router (BDR) is FE80::205:5FFF:FED3:5808
B.This is the designated router (DR) on the FastEthernet 0/0 link
C.Interface FastEthernet 0/0 was configured with the ipv6 ospf 1 area 1 command
D.OSPF version 2 has been enabled to support IPv6
E.The output was generated by the show ip interface command
Refer to the output. What IOS command produces this output?()
A.show ip ospf
B.show ip ospf interface
C.show ipv6 ospf interface
D.show ipv6 ospf
Refer to the exhibit. Assume that Switch_A is active for the standby group and the standby devicehas only the default HSRP configuration. What conclusion is valid?()
A.If port Fa1/1 on Switch_A goes down, the standby device will take over as active
B.If the current standby device were to have the higher priority value, it would take over the role ofactive for the HSRP group
C.If Switch_A had the highest prioritynumber, it would not take over as active router
D.If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190
Network topology exhibit:
In this network segment, the two routers on the network are configured for GLBP (Gateway LoadBalancing Protocol). What can be said about this?()
A.The hosts will have different default gateway IP addresses and different MAC addresses foreach rtouter
B.The default gateway address of each host should be set to the virtual IP address
C.The hosts will learn the proper default gateway IP address from Router R1
D.The default gateway address of each host should be set to the real IP address of the router
E.None of the other alternatives apply
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
A.Router A is responsible for answering ARP requests sent to the virtual IP address.
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC addressof Router A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG
Routers R1 and R2 are configured for HSRP as shown below:
Router R1:
interface ethernet 0
ip address 20.6.2.1 255.255.255.0
standby 35 ip 20.6.2.21
standby 35 priority 100
interface ethernet 1
ip address 20.6.1.1.2 255.255.255.0
standby 34 ip 20.6.1.21
Router R2:
interface ethernet 0
ip address 20.6.2.2 255.255.255.0
standby 35 ip 20.6.2.21
interface ethernet 1
ip address 20.6.1.1.1 255.255.255.0
standby 34 ip 20.6.1.21
standby 34 priority 100
You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice veryfrequent HSRP group state transitions. What is the most likely cause of this?()
A.physical layer issues
B.no spanning tree loops
C.use of non-default HSRP timers
D.failure to set the command standby 35 preempt
A.It can be used to block bulk encryption attacks
B.It can be used to protect against denial of service attacks
C.Traffic originating from the router is considered trusted, so it is not inspected
D.Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
E.Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
最新試題
Which three statements accurately describe IOS Firewall configurations?()
Drag and drop each management protocol on the above to the correct category on the below.
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()
Which statement about PPPoA configuration is correct?()
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()