A. TK1#show ip eigrp adjacency
B. TK1#show ip eigrp topology
C. TK1#show ip eigrp interfaces
D. TK1#show ip eigrp neighbors
E. None of the above
您可能感興趣的試卷
你可能感興趣的試題
A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following:
TK1(config)# router ospf 1
TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0
After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()
A. The AS is not correctly configured
B. The network subnet mask is incorrectly configured
C. The network wildcard mask is configured incorrectly
D. The network number is not correctly configured
E. The process id is configured incorrectly
F. None of the above
On your OSPF network, routers TK1 and TK2 belong to the same Ethernet network. However, they are unable to establish an adjacency over this link. While troubleshooting this problem, you issue the "show ip ospf interface Ethernet 0"command on each router. The output from these commands is displayed below:
What is the underlying cause of the routers failing to become adjacent?()
A. The OSPF area is misconfigured.
B. The priority on TK2 should be set lower.
C. The cost on TK2 should be set lower.
D. The hello and dead timers are misconfigured.
E. You need to add a backup designated router to the network.
F. The OSPF process ID numbers do not match.
While trying to diagnose a routing problem in the network, you issue RIP debugging as displayed below:
RtrA#debug ip rip
Rip protocol debugging is on
RtrA#
1d05h: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1)
1d05h: RIP: build update entries
1d05h: network 10.0.0.0 metric 1
1d05h: network 192.168.1.0 metric 2
1d05h: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (10.0.8.1)
1d05h: RIP: build update entries
1d05h: network 172.16.0.0 metric 1
RtrA#
1d05h: RIP: received v1 update from 10.0.15.2 on Serial0/0
1d05h: 192.168.1.0 in 1 hops
1d05h: 192.168.0 in 16 hops (inaccessible)
Based on the output of the above exhibit, which two of the following statements are true?()
A. A ping to 10.0.15.2 will be successful.
B. RtrA has three interfaces that will take part in the RIP process.
C. There are at least two routers participating in the RIP process.
D. A ping to 192.168.168.2 will be successful.
A. TK1# show ip ospf interface
B. TK1# show ip ospf priority
C. TK1# show ospf neighbor detail
D. TK1# show ospf processes
E. TK1# show ospf neighbor state
A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B. The VTP management domain name of both switches must be set the same.
C. All ports on both the switches must be set as access port.
D. One of the two switches must be configured as a VTP server.
E. A rollover cable is required to connect the two switches together.
F. A router must be used to forward VTP traffic between VLANs.
最新試題
Which of the following contribute to congestion on an Ethernet network?()
What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Which connections allow the use of full-duplex Ethernet?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which of the following describe router functions?()