多选题The answers each list a tunnel method and two consecutive IPv6 address quartets.Which answers identify a tunneling method that relies on an IPv4 address to be embedded into an IPv6 address, within the correct quartets listed?()AAutomatic 6to4, quartets 2 and 3BAutomatic 6to4, quartets 7 and 8CISATAP, quartets 2 and 3DISATAP, quartets 7 and 8

多选题
The answers each list a tunnel method and two consecutive IPv6 address quartets.Which answers identify a tunneling method that relies on an IPv4 address to be embedded into an IPv6 address, within the correct quartets listed?()
A

Automatic 6to4, quartets 2 and 3

B

Automatic 6to4, quartets 7 and 8

C

ISATAP, quartets 2 and 3

D

ISATAP, quartets 7 and 8


参考解析

解析: 暂无解析

相关考题:

An engineer has typed four different single - line prefix lists in a word processor. The four answers show the four different single -lin e prefix lists. The engineer then does a copy/paste of the configuration into a router.Which of the lists could match a subnet whose prefix length is 27?()A. ip prefix - list fred permit 10.0.0.0/24 ge 16 le 28B. ip prefix - list barney permit 10.0.0.0/24 le 28C. ip prefix - list wilma permit 10.0.0.0/24 ge 25D. ip prefix - list betty permit 10.0.0.0/24 ge 28

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0

An engineer has typed four different single - line prefix lists in a word processor. The four answers show the four different single -lin e prefix lists. The engineer then does a copy/paste of the configuration into a router. Which of the lists could match a subnet whose prefix length is 27?()A、ip prefix - list fred permit 10.0.0.0/24 ge 16 le 28B、ip prefix - list barney permit 10.0.0.0/24 le 28C、ip prefix - list wilma permit 10.0.0.0/24 ge 25D、ip prefix - list betty permit 10.0.0.0/24 ge 28

A router has been configured with the commands router os pf 9, network 172.16.1.0 0.0.0.255 area 8, and network 172.16.0.0 0.0.255.255 area 9, in that order. No other OSPF -related commands have been configured. The answers list the IP addresses that could be assigned to this router's Fa0/0 interface. Which an swers list an IP address/prefix length that would cause the router to put Fa0/0 into area 9?()A、172.16.0.1/23B、172.16.1.1/26C、172.16.1.1/24D、172.16.0.255/23E、None of the other answers is correct.

Which two statements or sets of statements are true about the application of the qos pre-classify command?()A、 If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.B、 The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.C、 With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.D、 With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.E、 With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface

11. public void addStrings(List list) {  12. list.add(”foo”);  13. list.add(”bar”);  14. }  What must you change in this method to compile without warnings?() A、 add this code after line 11: list = (List) list;B、 change lines 12 and 13 to: list.add(”foo”); list.add(”bar”);C、 change the method signature on line 11 to: public void addStrings(List extends String list) {D、 change the method signature on line 11 to: public void addStrings(List super String list) {E、 No changes are necessary. This method compiles without warnings.

A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededB、Two switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededC、Two switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededD、One switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

In a configuration with redundant supervisors, how many IP addresses are required to configure full remote access via management 0?()     A、 two IP addresses, one for each supervisorB、 three IP addresses, one virtual IP and one physical IP for each supervisorC、 one IP address that is shared among supervisorsD、 none—management 0 will use the IP address from the first SVI that is created

Which of these statements best describes the major difference between an IPv4-compatible tunnel and a 6to4 tunnel? ()A、 An IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel.B、 The deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a 6to4 tunnel does not require any special code.C、 An IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is used to connect to connect two or more IPv6 domains.D、 For an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a 6to4 tunnel, the ISP assigns only IPv6 addresses for each domain.

A router has been configured with the commands router eigrp 9 and network 72.16.1.0 0.0.0.255. No other EIGRP - related commands have been configured. The nswers list the IP addresses that could be assigned to this router's Fa0/0 interface. Which answers list an IP address/prefix length that would cause the router to enable IGRP on Fa0/0?()A、172.16.0.1/23B、172.16.1.1/26C、172.16.1.1/24D、172 .16.0.255/23E、None of the other answers is correct.

A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.B、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.C、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.D、One switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

Company.com has two POWER5 servers. They want the two servers’ virtual Ethernets to appear on the same IP subnet. Which of the following will connect the client virtual Ethernet adapters to the physical Ethernet switch connecting the two servers?()A、Configure a Shared Ethernet Adapter on the Virtual I/O Server.B、Use the same virtual LAN ID on each LPAR.C、Set up IP routing through an LPAR on each system.D、Set up an IP firewall through an LPAR on each system.

单选题What is a benefit of Internet protocol (IP) telephony?()ASynchronizes password exchanges for call setupBEliminates the need for physical cabling in a TCP/IP networkCEnables two-way voice transmission over a packet-switched TCP/IP networkDCreates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network

单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()ATwo switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededBTwo switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededCTwo switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededDOne switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

单选题You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The Exchange environment has two Edge Transport servers and two Hub servers.The CTO wants you to filter a list of IP addresses and requests that you add these IP addresses to the block list. You log into one of the Edge Transport servers and add the list of IPs to the block list.The next day the CTO informs you that the IP addresses he gave you are still able to send messages into the Exchange environment. What changes should you make to ensure these IP addresses are blocked?()ARestart the SMTP service.BReboot the Edge Transport server.CAdd the list to the second Edge Transport server.DRestart IIS.

单选题11. public void addStrings(List list) {  12. list.add(”foo”);  13. list.add(”bar”);  14. }  What must you change in this method to compile without warnings?()A add this code after line 11: list = (List) list;B change lines 12 and 13 to: list.add(”foo”); list.add(”bar”);C change the method signature on line 11 to: public void addStrings(List extends String list) {D change the method signature on line 11 to: public void addStrings(List super String list) {E No changes are necessary. This method compiles without warnings.

多选题A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()Aaccess-list 10 permit ip 192.168.147.0 0.0.0.255.255Baccess-list 10 permit ip 192.168.149.0 0.0.0.255.255Caccess-list 10 permit ip 192.168.146.0 0.0.0.0.255Daccess-list 10 permit ip 192.168.146.0 0.0.0.1.255Eaccess-list 10 permit ip 192.168.148.0 0.0.0.1.255Faccess-list 10 permit ip 192.168.146.0 255.255.255.0

单选题In a configuration with redundant supervisors, how many IP addresses are required to configure full remote access via management 0?()A two IP addresses, one for each supervisorB three IP addresses, one virtual IP and one physical IP for each supervisorC one IP address that is shared among supervisorsD none—management 0 will use the IP address from the first SVI that is created

多选题You are designing a strategy to assign the IP addresses to meet the business and technical requirement. Which two actions should you perform?()AInstall and Configure one DHCP server in Atlanta and one DHCP server in each branch office.BInstall and Configure two DHCP servers in Atlanta and two DHCP servers in each branch office.CCreate one scope on each DHCP server. Specify one DHCP server to always update DNS records. Configure the scope to assign half of the IP addresses available to each office.DCreate two scopes on each DHCP server. Specify one DHCP server to update DNS records only for client computers that request it. Specify a second DHCP server to never update DNS records.

单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()ATwo switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.BTwo switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.CTwo switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.DOne switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

多选题You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()AThe crypto ACL numberBThe IPSEC mode (tunnel or transport)CThe GRE tunnel interface IP addressDThe GRE tunnel source interface or IP address, and tunnel destination IP addressEThe MTU size of the GRE tunnel interface

单选题Which of these statements best describes the major difference between an IPv4-compatible tunnel and a 6to4 tunnel?()AAn IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel.BThe deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a 6to4 tunnel does not require any special code.CAn IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is used to connect to connect two or more IPv6 domains.DFor an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a 6to4 tunnel, the ISP assigns only IPv6 addresses for each domain.

多选题Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)AApply the method list to an interfaceBSpecify the default method list and apply it to the interfaceCEnable AAADDefine a method list

多选题Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()Athis login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly definedBIf the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe userCif the tacacs+ server fails to respond then the local database on the router will be used to authenticate the userDlogin is the name of the method list being configuredEif the tacacs+ server is unavailable, authentication will succeed automaticallyby default

单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()Awhen one of the tunnel peers has a dynamic IP addressBwhen one of the tunnel peers wants to force main mode to be usedCwhen fragmentation of the IKE packet is required between the two peersDwhen one of the tunnel peers wants to specify a different phase 1 proposal