A.Designated port
B.Nonswitch port
C.Switch port
D.Nonroot port
E.Nondesignated port
F.Root port
您可能感興趣的試卷
你可能感興趣的試題
A.show ip eigrp topology
B.show ip eigrp adjacency
C.show ip eigrp routes
D.show ip eigrp database
E.show ip route eigrp
F.show ip eigrp forwarding
A.255.255.255.255
B.224.0.0.6
C.FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF:FFF
D.FF02::10
E.224.0.0.10
F.FF02::5
A.Rl(config-if)#ipv6 default-information originate
B.Rl(config-router)#ipv6 rip 〈process-name〉 default-information only
C.Rl(config)#ipv6 route ::/0 null 0
D.Rl(config-if)#ipv6 rip 〈process-name〉 default-information only
E.Rl(config-router)#ipv6 rip route ;:/0 originate
F.Rl(config-router)#aggregate-address ::/0 summarize-routes
A.Ping 10.1.1.1 Data Pattern M
B.Ping 10.1.1.1 timeout 0
C.Ping 10.1.1.1 size 1500 df-bit
D.Ping 10.1.1.1 source loopback 0
E.Ping 10.1.1.1 size 1500
F.Ping 10.1.1.1 size 1500 Strict
A.RIP route 10.1.2.0/24
B.EIGRP route 10.1.2.0/24
C.RIP route 10.1.0.0/16
D.OSPF route 10.1.0.0/16
E.RIP route 10.0.0.0/16
F.OSPF route 10.1.2.0/24
最新試題
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
Which three statements accurately describe IOS Firewall configurations?()
Which statement about PPPoA configuration is correct?()
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.