A. RIPng allows for routes with up to 30 hops.
B. RIPng is enabled on each interface separately.
C. RIPng uses broadcasts to exchange routes.
D. There can be only one RIPng process per router.
您可能感興趣的試卷
你可能感興趣的試題
A. tunneling
B. hashing
C. routing
D. NAT
A. NIC
B. BIA
C. OUI
D. VAI
A. Connect a router on a local network.
B. Connect a router to another router.
C. Allow distribution of routes between networks.
D. Translate a private IP address.
E. Connect a network to the Internet.
A. Addresses in a private range will be not routed on the Internet backbone.
B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address in a valid IP address.
D. Several automated methods will be necessary on the private network.
E. A conflict of IP addresses happens, because other public routers can use the same range.
A. 10.180.48.224
B. 9.255.255.10
C. 192.168.20.223
D. 172.16.200.18
最新試題
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which pairing reflects a correct protocol-and-metric relationship?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
Which statement is true, as relates to classful or classless routing?()
Which command is used to display the collection of OSPF link states?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
Which IPsec security protocol should be used when confidentiality is required?()
On which options are standard access list based?()
Which statement describes the rule of split horizon?()