Refer to the exhibit. What two statements are true?()
A.The IP address of the backup designated router (BDR) is FE80::205:5FFF:FED3:5808
B.This is the designated router (DR) on the FastEthernet 0/0 link
C.Interface FastEthernet 0/0 was configured with the ipv6 ospf 1 area 1 command
D.OSPF version 2 has been enabled to support IPv6
E.The output was generated by the show ip interface command
您可能感興趣的試卷
你可能感興趣的試題
Refer to the output. What IOS command produces this output?()
A.show ip ospf
B.show ip ospf interface
C.show ipv6 ospf interface
D.show ipv6 ospf
Refer to the exhibit. Assume that Switch_A is active for the standby group and the standby devicehas only the default HSRP configuration. What conclusion is valid?()
A.If port Fa1/1 on Switch_A goes down, the standby device will take over as active
B.If the current standby device were to have the higher priority value, it would take over the role ofactive for the HSRP group
C.If Switch_A had the highest prioritynumber, it would not take over as active router
D.If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190
Network topology exhibit:
In this network segment, the two routers on the network are configured for GLBP (Gateway LoadBalancing Protocol). What can be said about this?()
A.The hosts will have different default gateway IP addresses and different MAC addresses foreach rtouter
B.The default gateway address of each host should be set to the virtual IP address
C.The hosts will learn the proper default gateway IP address from Router R1
D.The default gateway address of each host should be set to the real IP address of the router
E.None of the other alternatives apply
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()
A.Router A is responsible for answering ARP requests sent to the virtual IP address.
B.If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC addressof Router A
C.If another router were added to this GLBP group, there would be two backup AVGs
D.Router B is in GLBP listen state
E.Router A alternately responds to ARP requests with different virtual MAC addresses
F.Router B will transition from blocking state to forwarding state when it becomes the AVG
Routers R1 and R2 are configured for HSRP as shown below:
Router R1:
interface ethernet 0
ip address 20.6.2.1 255.255.255.0
standby 35 ip 20.6.2.21
standby 35 priority 100
interface ethernet 1
ip address 20.6.1.1.2 255.255.255.0
standby 34 ip 20.6.1.21
Router R2:
interface ethernet 0
ip address 20.6.2.2 255.255.255.0
standby 35 ip 20.6.2.21
interface ethernet 1
ip address 20.6.1.1.1 255.255.255.0
standby 34 ip 20.6.1.21
standby 34 priority 100
You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice veryfrequent HSRP group state transitions. What is the most likely cause of this?()
A.physical layer issues
B.no spanning tree loops
C.use of non-default HSRP timers
D.failure to set the command standby 35 preempt
最新試題
Which three statements accurately describe IOS Firewall configurations?()
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()
Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()