單項(xiàng)選擇題If an Ethernet port on a router was assigned an IP address of 172.1.1.1/20,what is the maximum number of hosts allowed on this subnet?()

A. 4094
B. 1024
C. 8190
D. 2046
E. 4096


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which IPV6 routing protocol uses multicast group FF02::9 to send updates?()

A. RIPng
B. OSPFv3
C. static
D. IS-IS for IPv6

3.單項(xiàng)選擇題Which type of EIGRP route entry describes a feasible successor?()

A. a primary route,stored in the routing table
B. a backup route,stored in the routing table
C. a backup route,stored in the topology table
D. a primary route,stored in the topology table

4.單項(xiàng)選擇題How dose a DHCP server dynamically assign IP address to host?()

A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
B. Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address must be made ,and another address is then assigned.
C. Addresses are leased to host.A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.
D. Addresses are permanently assigned so that the host uses the same address at all times.

最新試題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:?jiǎn)雾?xiàng)選擇題

How are VTP advertisements delivered to switches across the network?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題