A. to prevent routing loops
B. to create a default route
C. to provide multiple gateways for hosts
D. to maintain a loop-free Layer 2 network topology
E. to enhance the functions of SNMP
您可能感興趣的試卷
你可能感興趣的試題
A. defines how the media is accessed
B. supplies a token to determine which host has access to the media
C. defines the encoding of electrical signals on the wire
D. determines the preamble bits
A. path cost
B. lowest port MAC address
C. VTP revision number
D. highest port priority number
E. port priority number and MAC address
A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
B. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
C. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
D. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers
A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief
A. A configured router prompts for a password
B. A configured router goes to the privileged mode prompt
C. An un configured router goes into the setup dialog
D. An un configured router goes to the enable mode prompt
最新試題
Which connections allow the use of full-duplex Ethernet?()
What is a global command?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()
Which statement describes the rule of split horizon?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
Which of the following correctly describe steps in the OSI data encapsulation process?()