单选题Which command would correctly configure a serial port on a router with the last usable host address in the 192.216.32.32/29 subnet?()ARouter(config-if)# ip address 192.216.32.38 255.255.255.240BRouter(config-if)# ip address 192.216.32.39 255.255.255.224CRouter(config-if)# ip address 192.216.32.63 255.255.255.248DRouter(config-if)# ip address 192.216.32.39 255.255.255.248ERouter(config-if)# ip address 192.216.32.38 255.255.255.248

单选题
Which command would correctly configure a serial port on a router with the last usable host address in the 192.216.32.32/29 subnet?()
A

Router(config-if)# ip address 192.216.32.38 255.255.255.240

B

Router(config-if)# ip address 192.216.32.39 255.255.255.224

C

Router(config-if)# ip address 192.216.32.63 255.255.255.248

D

Router(config-if)# ip address 192.216.32.39 255.255.255.248

E

Router(config-if)# ip address 192.216.32.38 255.255.255.248


参考解析

解析: 暂无解析

相关考题:

Which command would correctly set a router‘s date and time?() A.AB.BC.CD.D

You are working with a client to deploy QoS on their Frame Relay WAN. They would like to be able to allow packets to cross the Frame Relay WAN but have them marked as discard eligible if they exceed the QoS policy.How would you accomplish this task?()A. Configure a class map that sets the DE bit so that the policy map can correctly apply a violate-action if the policy is exceeded.B. Configure a service policy that sets the DE bit and apply it to the serial interface connected to the Frame Relay WAN.C. Configure a policy map that has a burst-max action of setting the DE bit if the policy is exceeded.D. Configure a policy map that has a violate-action to change the DE bit from 0 to 1.

Refer to the exhibit. OSPF has been configured on all routers in the network. However, router R1 does not receive a default route to router R2 as in tended. Which configuration change would ensure that R1 would receive a default route from R2? ()A. Add the area 1 stub command on routers R1.B. Add the always keyword to the default - information originate configuration command on router R2.C. Remov e the default information originate configuration command from router R2 and place it on router R1.D. Add the ip route 5.0.0.0 255.255.255.0 0.0.0.0 command to router R2.

You are a network technician at TestKing, Inc. You are currently troubleshooting a routing issue on the Testking1 router. You issue the show ip route command. The output from the command is displayed in the following exhibit:Which one of the following routes WILL NOT be entered into its neighboring routers routing table?()A. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1B. C 192.168.1.0/24 is directly connected, Ethernet0C. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0E. None of the above

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?() A. Bandwidth 56000B. Bandwidth 56000000C. Bandwidth 56D. Bandwidth 56kbps

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?() A. enable cdpB. cdp enableC. cdp runD. run cdp

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()A、R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0B、R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1C、C 192.168.1.0/24 is directly connected, Ethernet 0D、R 192.168.5.0/24 [120/15] via 192.168.2.2,00:00:10,Serial0

You are working with a client to deploy QoS on their Frame Relay WAN. They would like to be able to allow packets to cross the Frame Relay WAN but have them marked as discard eligible if they exceed the QoS policy. How would you accomplish this task?()A、Configure a class map that sets the DE bit so that the policy map can correctly apply a violate-action if the policy is exceeded.B、Configure a service policy that sets the DE bit and apply it to the serial interface connected to the Frame Relay WAN.C、Configure a policy map that has a burst-max action of setting the DE bit if the policy is exceeded.D、Configure a policy map that has a violate-action to change the DE bit from 0 to 1.

You are configuring a Cisco multilayer switch for the Company network.  Which command would  you use to configure a port to act as a routed interface?()A、 ip routingB、 switchport mode trunkC、 no switchportD、 switchport trunk native vlan 1E、 None of the other alternatives apply

A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps

What are the steps for configuring stateful NBAR for dynamic protocols? ()A、use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceB、use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbersC、use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceD、configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. E、configure video streaming. Configure audio streaming. Attach the codec to an interface

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?()A、enable cdpB、cdp enableC、cdp runD、run cdp

Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

What are the steps for configuring stateful NBAR for dynamic protocols?()A、Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.B、Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.C、Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.D、Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.E、Configure video streaming. Configure audio streaming. Attach the codec to an interface.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

If you were to configure an ISL Ethernet trunk between two Cisco switches, named R1 and R2,   what would you have to include at the end of the link for the trunk to operate correctly? ()A、 An identical VTP mode.B、 An identical speed/duplex.C、 An identical trunk negotiation parameter.D、 An identical trunk encapsulation parameter.

Which of the following should be used to check a serial port for functionality?()A、Loopback plugB、Toner probeC、MultimeterD、Cable tester

What is the correct fastpath to configure or add a TTY Terminal (directly from the screen), which connects to a serial port?()A、smitty ttyB、smitty devicesC、smitty ptyD、smitty dev

A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

Which of the following options allows for the remote administration of a Core installation of  Windows Server 2012 R2 from another server running Windows Server 2012 R2?()A、Configure Router Guard.B、Configure Port Mirroring.C、Enable Remote Management.D、Enable Remote Desktop.E、Using Server Manager.

单选题Which configuration command dynamically detects and configures a PPPoA interface?()Aauto-configure ipBauto-configure pppCauto-configure pppoeDauto-configure bridgedethernet

单选题You are configuring a Cisco multilayer switch for the Company network.  Which command would  you use to configure a port to act as a routed interface?()A ip routingB switchport mode trunkC no switchportD switchport trunk native vlan 1E None of the other alternatives apply

单选题Which of the following kdb subcommands should be entered to obtain information about a serial port?()A ttyB statC traceD stream

单选题What are the steps for configuring stateful NBAR for dynamic protocols? ()Ause the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceBuse the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbersCuse the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interfaceDconfigure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface. Econfigure video streaming. Configure audio streaming. Attach the codec to an interface

单选题Which statement correctly describes IPsec VPN backup technology?()AThe cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolBReverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksCEach Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressDThe cypto isakmp keepalive command is used to configure stateless failover