A. learning
B. listening
C. discarding
D. forwarding
您可能感興趣的試卷
你可能感興趣的試題
A. server
B. client
C. tunnel
D. transparent
A. show mac-address
B. show arp
C. show table
D. show switchport
A. show command
B. debug command
C. configuration command
D. rommon command
A. 8 subnets, 31 hosts
B. 8 subnets, 32 hosts
C. 16 subnets, 30 hosts
D. 16 subnets, 32 hosts
E. A Class B address can't be subnetted into the fourth octet.
Users have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router# show frame relay pvc command shown in the graphic, which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?()
A. DLCI = 100
B. last time PVC status changed 00:25:40
C. in BECN packets 192
D. in FECN packets 147
E. in DE packets 0
最新試題
What is the default administrative distance of OSPF?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
Which IPsec security protocol should be used when confidentiality is required?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()