A. RARP
B. RUDP
C. ICMP
D. SNMP
您可能感興趣的試卷
你可能感興趣的試題
A. standardization
B. conversion
C. encapsulation
D. synchronization
A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com
A. Serial0/1 is up, line protocol is down
B. Serial0/1 is down, line protocol is down
C. Serial0/1 is up, line protocol is up
D. Serial0/1 is administratively down, line protocol is down
A. Addresses are not hierarchical and are assigned at random.
B. Only one IPv6 address can exist on a given interface.
C. There are 2.7 billion addresses available.
D. Broadcasts have been eliminated and replaced with multicasts.
A. RIPng allows for routes with up to 30 hops.
B. RIPng is enabled on each interface separately.
C. RIPng uses broadcasts to exchange routes.
D. There can be only one RIPng process per router.
最新試題
Which command is used to display the collection of OSPF link states?()
What is the purpose of the cisco Vlan Trunking protocol?()
Which statement describes the rule of split horizon?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
Which IPsec security protocol should be used when confidentiality is required?()