A.RIP route 10.1.2.0/24
B.EIGRP route 10.1.2.0/24
C.RIP route 10.1.0.0/16
D.OSPF route 10.1.0.0/16
E.RIP route 10.0.0.0/16
F.OSPF route 10.1.2.0/24
您可能感興趣的試卷
你可能感興趣的試題
A.OSPF topology table
B.OSPF interface table
C.OSPF routing information base
D.OSPF link-state database
E.OSPF adjacency table
F.OSPF neighbor table
A.Problem report
B.Problem collaboration
C.Problem diagnosis
D.Problem resolution
E.Problem documentation
F.Probiem authentication
A.0000.0c70.ac22
B.0000.0c07.22ac
C.0000.0c07.acl6
D.0000.0c07.ac22
E.0000.0c70.cala
F.0000.0d22.ac07
A.Eliminate potential causes
B.Collect information
C.Document causes
D.Hypothesize underlying causes
E.Verif/ hypothesis
F.Examine collected information
A.The adjacency table is populated from a router’s ARP cache
B.CEF does not require the first packet of a data flow to be process switched
C.CEF maintains the Forward Information Base and the adjacency table
D.CEF can be enabled with the interface command ip cef
E.The FIB is populated from a router’s IP routing table
F.On most router platforms CEF is enabled by default
最新試題
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
Which statement about PPPoA configuration is correct?()
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()