The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?()A、172.25.78.243B、172.25.98.16C、172.25.72.0D、172.25.94.255E、172.25.96.17F、172.25.100.16

The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?()

  • A、172.25.78.243
  • B、172.25.98.16
  • C、172.25.72.0
  • D、172.25.94.255
  • E、172.25.96.17
  • F、172.25.100.16

相关考题:

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI

The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)A.ARPB.CDPC.DHCPD.DNSE.ICMP

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?() A.ARPB.CDPC.DHCPD.DNSE.ICMP

The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router?()A.172.25.78.243B.172.25.98.16C.172.25.72.0D.172.25.94.255E.172.25.96.17F.172.25.100.16

A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough useable addresses while wasting the fewest addresses()。 A.192.168.10.80/28B.192.168.10.80/29C.192.168.10.96/28D.192.168.10.96/29

What are three reasons to collect Netflow data on a company network?()A、To identify applications causing congestionB、To authorize user network accessC、To report and alert link up / down instances.D、To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.E、To detect suboptimal routing in the network.F、To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()A、A new default gateway has been setup.B、A new Internet shortcut has been added.C、A new web browser has been installed and is now the default.D、A proxy server has been enabled.

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()A、ARPB、CDPC、DHCPD、DNSE、ICMP

The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()A、PIM sparse mode is being used.B、PIM dense mode is being used.C、The BGP multicast address family has not been configured.D、IGMP version 3 is being used.E、IP PIM neighbor filters have not been applied.

A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough useable addresses while wasting the fewest addresses()。A、192.168.10.80/28B、192.168.10.80/29C、192.168.10.96/28D、192.168.10.96/29

Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: "Gateway of last resort is 1.1.1.1 to network 2.0.0.0". Whic h of the following is most likely to have caused this output to occur on R1?()A、R1 has been configured with an ip default- network 2.0.0.0 command.B、R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.C、R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.D、Another router has been configured with an ip default - network 2.0.0.0 command.E、Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A、The wrong cable type has been used.B、. IDS has shut down the computer's switch port.C、The port on the switch is configured incorrectlyD、Spanning tree protocol was implemented.

A new system has been installed and the network connection is very slow. The network administrators are sure that the network port is set to 100 full duplex. What command will display the configured and current speed settings of the adapter?()A、lsdevB、lsattrC、entstatD、ifconfig

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()AOne router is running RIPv1.BRIP neighbor is 224.0.0.9.CThe network contains a loop.DNetwork 10.10.1.0 is reachable.

单选题Which of these phases involves ensuring that a new solution has been integrated without disrupting the existing network? Select exactly 1 answer(s) from the following:()。AplanBprepareCoperateDimplement

单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()AThe wrong cable type has been used.B. IDS has shut down the computer's switch port.CThe port on the switch is configured incorrectlyDSpanning tree protocol was implemented.

单选题The server administrator discovers that a server, which has not been patched, is runningextremely slow and suspects that the server may have been compromised. Which of the following commands should the administrator use to check the number of network connections the server is making?()AnetstatBpingCnslookupDgrep

多选题A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()AARPBCDPCDHCPDDNSEICMP

单选题Port of Registry refers to the port where().Athe ship has been namedBthe ship has been builtCthe ship has been signedDthe ship has been registered

单选题A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()AFor the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.BFor the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.CDirect inter-vlan communication does not require OSPFDOSPF cannot be used if router-on-a-stick is configured on the router

单选题Which of the following should be performed after a maintenance kit has been applied and fullfunctionality tested?()ARoller regenerator appliedBPage count resetCNew network settings appliedDPrinter drum replacement