多项选择题
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network?()
A.The subnet mask in use is 255.255.255.192.
B.The subnet mask in use is 255.255.255.128.
C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E.The LAN interface of the router is configured with one IP address.
F.The LAN interface of the router is configured with multiple IP addresses.
相关考题
-
多项选择题
The network administrator must complete the connection between the RTA of the XYZ Company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop to the central office of the provider (Choose two.)()。
A.WAN switch
B.PVC
C.ATM switch
D.multiplexer
E.CSU/DSU
F.modem -
多项选择题
Which statements are true about EIGRP successor routes? ()
A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process. -
单项选择题
What is one reason that WPA encryption is preferred over WEP()。
A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
