单选题What are the usable hosts on the 192.168.1.24/29 network?()A .24 through .48B .24 through .32C .25 through .30D .35 through .31

题目
单选题
What are the usable hosts on the 192.168.1.24/29 network?()
A

.24 through .48

B

.24 through .32

C

.25 through .30

D

.35 through .31

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What is a Label-Switched Path?()

A. a traffic engineered path

B. another name for a Frame Relay PVC

C. a bidirectional path through a network

D. a unidirectional path through a network


参考答案:D

第2题:

What are the usable host on the 96.6.128.0/19 network?()

A. 96.6.128.1 through 96.6.143.254

B. 96.6.128.128 through 96.6.134.254

C. 96.6.128.0 through 96.6.134.254

D. 96.6.128.1 through 96.6.159.254


参考答案:D

第3题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第4题:

Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

A.Replace the straight-through cable with a crossover cable

B.Change the subnet mask of the hosts to /25

C.Change the subnet mask of the hosts to /26

D.Change the address of Workstation A to 192.0.2.15

E.Change the address of Workstation B to 192.0.2.111


参考答案:A, B

第5题:

Refer to the exhibit The neighbor 10.1.1.1 weight 200 BGP configuration command has been configured on router A. What will be the result of this configuration? ()

A. Router A will prefer the path through router B for network 172.20.0.0

B. Router A will prefer the path through router C for network 172.20.0.0

C. Packets from router D will prefer the path through router B for networks advertised by router A

D. Packets from r outer D will prefer the path through router C for networks advertised by router A


参考答案:A

第6题:

What are the usable hosts on the 192.168.1.24/29 network?()

A..24 through .48

B..24 through .32

C..25 through .30

D..35 through .31


参考答案:C

第7题:

Which of the following BEST describes a DAS?()

A. A collection of disks presented as storage to multiple servers through dedicated channels.

B. A collection of disks presented as storage to a single server through an existing network.

C. A collection of disks presented as storage to a single server through directly attached technologies.

D. A collection of disks presented as storage to multiple servers through an existing network.


参考答案:C

第8题:

What are the usable hosts on the .128.0/19 network?()

A. .128.1 through .143.254

B. .128.128 through .134.254

C. .128.0 through .134.254

D. .128.1 through .159.254


参考答案:D

第9题:

assumingthedefaultswitchconfigurationwhichvlanrangecanbeaddedmodifiedandremovedonaciscoswitch?()

A.2through1001

B.1through1001

C.1through1002

D.2through1005


参考答案:A

第10题:

What are two reasons that a network administrator would use access lists (Choose two.)()。

  • A、to control vty access into a router
  • B、to control broadcast traffic through a router
  • C、to filter traffic as it passes through a router
  • D、to filter traffic that originates from the router
  • E、to replace passwords as a line of defense against security incursions

正确答案:A,C

更多相关问题