A.show inventory B.show flash:filesys C.dirflash:include chassis D.show diag E.show controllers
多项选择题Which two statements are characteristics of a distance vector routing protocol?()
A. RIP is an example of distance vector routing protocols. B. Updates are periodic and include the entire routing table. C. Routing updates are sent only after topology changes D. The protocol can be useful in hub-and-spoke and hierarchical networks. E. Convergence is usually faster than with link state protocols F. Each router has its own view of the topology
多项选择题The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A.172.22.243.127 B.172.22.243.191 C.172.22.243.190 D.10.16.33.98 E.10.17.64.34 F.192.168.1.160
多项选择题A network administrator needs to configure port security on a switch.which two statements are true?()
A. The network administrator can apply port security to dynamic access ports B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan. C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. D. The network administrator can apply port security to EtherChannels. E. When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
多项选择题Which two statements apply to dynamic access lists?()
A. they offer simpler management in large internetworks. B. you can control logging messages. C. they allow packets to be filtered based on upper-layer session information. D. you can set a time-based security policy. E. they provide a level of security against spoofing. F. they are used to authenticate individual users.
多项选择题Which two of these are characteristics of the 802.1Q protocol?()
A. it is a layer 2 messaging protocol which maintains vlan configurations across network. B. it includes an 8-bit field which specifies the priority of a frame. C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes. D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed. E. it is a trunking protocol capable of carring untagged frames.