單項選擇題In order to maintain security, with which hop count are IPv6 neighbor discovery packets sent?()

A.0
B.1
C.255
D.256


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two tunneling techniques support IPv6 multicasting?()

A.6to4
B.6over4
C.ISATAP
D.6PE
E.GRE

2.單項選擇題You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one? ()

A. Both support normal and extended VLAN ranges.
B. ISL is a Cisco proprietary encapsulation method and 802.1Q is an IEEE standard.
C. ISL encapsulates the original frame.
D. Both support native VLANs.
E. 802.1Q does not encapsulate the original frame.

3.單項選擇題How will EIGRPv6 react if there is an IPv6 subnet mask mismatch between the Global Unicast addresseson a point-to-point link?()

A.EIGRPv6 will form a neighbor relationship.
B.EIGRPv6 will not form a neighbor relationship.
C.EIGRPv6 will form a neighbor relationship, but with the log MSG: "EIGRPv6 neighbor not on a commonsub net."
D.EIGRPv6 will form a neighbor relationship, but routes learned from that neighbor will not be installed inthe routing table.

4.多項選擇題Which three of these statements about Dynamic Trunking Protocol are correct?()

A. It supports autonegotiation for both ISL and IEEE 802.1Q trunks.
B. It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.
C. It is a point-to-multipoint protocol.
D. It is a point-to-point protocol.
E. It is not supported on private VLAN ports or tunneling ports.

最新試題

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correctBGP session endpoint addresses and the correct BGP session hop-count limit EBGP multihop. What is agood first test to see if BGP will work across the firewall?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題

All of these are fundamental building blocks of differentiated services Traffic Conditioner Block exceptwhich one?()

題型:單項選擇題

Which two EIGRP options will limit a query domain?()

題型:多項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

Which two are differences between IGMPv2 and IGMPv3 reports?()

題型:多項選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項選擇題

What is true about Unicast RPF in strict mode?()

題型:單項選擇題

Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()

題型:單項選擇題