單項(xiàng)選擇題

Part of the routing table of router PG1 is displayed below:

From analyzing the above command output,what is the administrative distance of the external EIGRP routes()

A.24
B.32
C.90
D.170
E.27316
F.None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()

A.The neighboring router stops receiving ACK packets from this router.
B.The neighboring router starts receiving route updates from this router.
C.The neighboring router is too busy to answer the query(generally caused by high CPU utilization).
D.The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

2.單項(xiàng)選擇題At which lay er of the OSI model does the Spanning Tree Protocol (STP) operate at()

A.Lay er 5
B.Lay er 4
C.Lay er 3
D.Lay er 2
E.Lay er 1

3.多項(xiàng)選擇題Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()

A.The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.
B.The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C.The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.
D.The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

最新試題

As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:?jiǎn)柎痤}

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:?jiǎn)柎痤}

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:?jiǎn)柎痤}

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:?jiǎn)雾?xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()

題型:多項(xiàng)選擇題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項(xiàng)選擇題