.128.1 through .143.254
.128.128 through .134.254
.128.0 through .134.254
.128.1 through .159.254
第1题:
A. a traffic engineered path
B. another name for a Frame Relay PVC
C. a bidirectional path through a network
D. a unidirectional path through a network
第2题:
A. 96.6.128.1 through 96.6.143.254
B. 96.6.128.128 through 96.6.134.254
C. 96.6.128.0 through 96.6.134.254
D. 96.6.128.1 through 96.6.159.254
第3题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
第4题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第5题:
A. Router A will prefer the path through router B for network 172.20.0.0
B. Router A will prefer the path through router C for network 172.20.0.0
C. Packets from router D will prefer the path through router B for networks advertised by router A
D. Packets from r outer D will prefer the path through router C for networks advertised by router A
第6题:
A..65 through .126
B..64 through .127
C..66 through .128
D..65 through .127
第7题:
A. A collection of disks presented as storage to multiple servers through dedicated channels.
B. A collection of disks presented as storage to a single server through an existing network.
C. A collection of disks presented as storage to a single server through directly attached technologies.
D. A collection of disks presented as storage to multiple servers through an existing network.
第8题:
A. .128.1 through .143.254
B. .128.128 through .134.254
C. .128.0 through .134.254
D. .128.1 through .159.254
第9题:
A.2through1001
B.1through1001
C.1through1002
D.2through1005
第10题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()