参考答案和解析
正确答案:C
更多“What are the usable hosts on the 192.168.1.24/29 network?()A、.24 through .48B、.24 through .32C、.25 through .30D、.35 through .31”相关问题
  • 第1题:

    What are the usable host on the 96.6.128.0/19 network?()

    A. 96.6.128.1 through 96.6.143.254

    B. 96.6.128.128 through 96.6.134.254

    C. 96.6.128.0 through 96.6.134.254

    D. 96.6.128.1 through 96.6.159.254


    参考答案:D

  • 第2题:

    Refer to the exhibit The neighbor 10.1.1.1 weight 200 BGP configuration command has been configured on router A. What will be the result of this configuration? ()

    A. Router A will prefer the path through router B for network 172.20.0.0

    B. Router A will prefer the path through router C for network 172.20.0.0

    C. Packets from router D will prefer the path through router B for networks advertised by router A

    D. Packets from r outer D will prefer the path through router C for networks advertised by router A


    参考答案:A

  • 第3题:

    assumingthedefaultswitchconfigurationwhichvlanrangecanbeaddedmodifiedandremovedonaciscoswitch?()

    A.2through1001

    B.1through1001

    C.1through1002

    D.2through1005


    参考答案:A

  • 第4题:

    Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has beenassigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cablE.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

    A.Replace the straight-through cable with a crossover cable

    B.Change the subnet mask of the hosts to /25

    C.Change the subnet mask of the hosts to /26

    D.Change the address of Workstation A to 192.0.2.15

    E.Change the address of Workstation B to 192.0.2.111


    参考答案:A, B

  • 第5题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第6题:

    Which of the following virtualization options are unique to AIX and PowerVM compared to other UNIX based offerings?()

    • A、Software virtualization through PowerVM and hardware virtualization through IBM Systems Director.
    • B、Hardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.
    • C、Software virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.
    • D、Hardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.

    正确答案:C

  • 第7题:

    With the command atm bulk-config test vc-range 1 3 200 400, what is the correct interpretation of the numeric values following the vc-range?()

    • A、vpi 1 vci 200, vpi 3 vci 400
    • B、vpi 1 through 3, vci 200 through 400
    • C、vpi 1 vci 200 through 400, vpi 3 vci 200 through 400
    • D、vci 1 through 3, vpi 200 through 400

    正确答案:B

  • 第8题:

    What are the usable host on the 96.6.128.0/19 network?()

    • A、96.6.128.1 through 96.6.143.254
    • B、96.6.128.128 through 96.6.134.254
    • C、96.6.128.0 through 96.6.134.254
    • D、96.6.128.1 through 96.6.159.254

    正确答案:D

  • 第9题:

    单选题
    What is a Label-Switched Path?()
    A

    a traffic engineered path

    B

    another name for a Frame Relay PVC

    C

    a bidirectional path through a network

    D

    a unidirectional path through a network


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    What are the usable hosts on the 192.168.1.24/29 network?()
    A

    .24 through .48

    B

    .24 through .32

    C

    .25 through .30

    D

    .35 through .31


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()
    A

     Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

     Allow all inbound VPN traffic to pass through the perimeter firewall only.

    C

     Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

     Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following BEST describes a DAS?()

    A. A collection of disks presented as storage to multiple servers through dedicated channels.

    B. A collection of disks presented as storage to a single server through an existing network.

    C. A collection of disks presented as storage to a single server through directly attached technologies.

    D. A collection of disks presented as storage to multiple servers through an existing network.


    参考答案:C

  • 第14题:

    Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

    A. Replace the straight-through cable with a crossover cable.

    B. Change the subnet mask of the hosts to /25.

    C. Change the subnet mask of the hosts to /26.

    D. Change the address of Workstation A to 192.0.2.15.

    E. Change the address of Workstation B to 192.0.2.111.


    参考答案:A, B

  • 第15题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    A.to control vty access into a router

    B.to control broadcast traffic through a router

    C.to filter traffic as it passes through a router

    D.to filter traffic that originates from the router

    E.to replace passwords as a line of defense against security incursions


    参考答案:A, C

  • 第16题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第17题:

    Which of the following BEST describes a DAS?()

    • A、A collection of disks presented as storage to multiple servers through dedicated channels.
    • B、A collection of disks presented as storage to a single server through an existing network.
    • C、A collection of disks presented as storage to a single server through directly attached technologies.
    • D、A collection of disks presented as storage to multiple servers through an existing network.

    正确答案:C

  • 第18题:

    What is a Label-Switched Path?()

    • A、a traffic engineered path
    • B、another name for a Frame Relay PVC
    • C、a bidirectional path through a network
    • D、a unidirectional path through a network

    正确答案:D

  • 第19题:

    What are the usable hosts on the .128.0/19 network?()

    • A、.128.1 through .143.254
    • B、.128.128 through .134.254
    • C、.128.0 through .134.254
    • D、.128.1 through .159.254

    正确答案:D

  • 第20题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第21题:

    单选题
    What are the usable host on the 96.6.128.0/19 network?()
    A

    96.6.128.1 through 96.6.143.254

    B

    96.6.128.128 through 96.6.134.254

    C

    96.6.128.0 through 96.6.134.254

    D

    96.6.128.1 through 96.6.159.254


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    What are the usable hosts on the .128.0/19 network?()
    A

    .128.1 through .143.254

    B

    .128.128 through .134.254

    C

    .128.0 through .134.254

    D

    .128.1 through .159.254


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following BEST describes a DAS?()
    A

    A collection of disks presented as storage to multiple servers through dedicated channels.

    B

    A collection of disks presented as storage to a single server through an existing network.

    C

    A collection of disks presented as storage to a single server through directly attached technologies.

    D

    A collection of disks presented as storage to multiple servers through an existing network.


    正确答案: A
    解析: 暂无解析