A. show chassis routing-engine B. show system file-storage C. file list D. show system storage
多项选择题You have been asked to establish reachability between Router 1s and Router 2s loopback addresses as shown in the exhibit.Which two steps will accomplish this task?()
A. Create a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.2 B. Create a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.1 C. Create a static route on Router 2 to 172.17.25.1 with a next hop of 10.10.10.1 D. Create a static route on Router 1 to 172.17.25.1 with a next hop of 10.10.10.2
单项选择题What is the purpose of a network mask?()
A. It is used to identify the maximum hop count of a subnetwork B. It is used to identify an IP address as either private or public C. It is used to identify the network to which an IP address belongs D. It is used to identify the total number of bits present in an IP address
单项选择题Given the configuration and routing table shown in die exhibit,which routes will be advertised to OSPF neighbors because of the demo policy?()
A. 192.168.0.0/16 only B. 192.168.0.0/17 only C. 192.168.50 0/24 and 192168.51.0/24 D. 192.168.0.0/17, 192.168.50 0/24. and 192.168.51.0/24
多项选择题What are two valid match criteria for a routing policy? ()
A.OSPF are a ID B.prefix list C.port D.time-to-live(TTL)
多项选择题Which two statements are true about the rescue configuration file?()
A. It must include a root password. B. It is roll back file number 50, and you can recover it by issuing rollback 50. C. It is created by issuing request system configuration rescue save. D. It is updated automatically when you commit