.24 through .48
.24 through .32
.25 through .30
.35 through .31
第1题:
A. a traffic engineered path
B. another name for a Frame Relay PVC
C. a bidirectional path through a network
D. a unidirectional path through a network
第2题:
A. 96.6.128.1 through 96.6.143.254
B. 96.6.128.128 through 96.6.134.254
C. 96.6.128.0 through 96.6.134.254
D. 96.6.128.1 through 96.6.159.254
第3题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
第4题:
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A.Replace the straight-through cable with a crossover cable
B.Change the subnet mask of the hosts to /25
C.Change the subnet mask of the hosts to /26
D.Change the address of Workstation A to 192.0.2.15
E.Change the address of Workstation B to 192.0.2.111
第5题:
A. Router A will prefer the path through router B for network 172.20.0.0
B. Router A will prefer the path through router C for network 172.20.0.0
C. Packets from router D will prefer the path through router B for networks advertised by router A
D. Packets from r outer D will prefer the path through router C for networks advertised by router A
第6题:
A..24 through .48
B..24 through .32
C..25 through .30
D..35 through .31
第7题:
A. A collection of disks presented as storage to multiple servers through dedicated channels.
B. A collection of disks presented as storage to a single server through an existing network.
C. A collection of disks presented as storage to a single server through directly attached technologies.
D. A collection of disks presented as storage to multiple servers through an existing network.
第8题:
A. .128.1 through .143.254
B. .128.128 through .134.254
C. .128.0 through .134.254
D. .128.1 through .159.254
第9题:
A.2through1001
B.1through1001
C.1through1002
D.2through1005
第10题:
What are two reasons that a network administrator would use access lists (Choose two.)()。