單項選擇題Which IPv6 address is valid?()

A. 2031:0:130F::9C0:876A:130B
B. 2001:0DB8:0000:130F:0000:0000:08GC:140B
C. 2001:0DB8:0:130H::87C:140B
D. 2031::130F::9C0:876A:130B


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of the following protocols uses both TCP and UDP ports?()

A. SMTP
B. Telnet
C. FTP
D. DNS

2.單項選擇題Which command enhances the 802.1D convergence time on ports that are connected to hosts?()

A. spanning-tree backbonefast
B. spanning-tree uplinkfast
C. spanning-tree portfast
D. spanning-tree cost512

4.單項選擇題Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?()

A. show secure
B. show file systems
C. show flash
D. show version

5.單項選擇題What is the most likely reason for the dispartly between the actual network numbers at the branches and the routes in the routing table on Gateway-Router?()

A. Branch-Router2 is configured to send both RIPv1 and RIPv2 updates.
B. Gateway-Router is configured to only receive RIPv2 updates.
C. Gateway-router is configured to receive only RIPv1 updates.
D. Branch-Router1 is configured to only send RIPv1 updates

最新試題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

How are VTP advertisements delivered to switches across the network?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題