單項選擇題You have a network that supports VLSM and you need to reduce IP address waste in your point to point WAN links. Which of the masks below would you use?()

A./38
B./30
C./27
D./23
E./18
F./32


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題You have a single Class C IP address and a point-to-point serial link that you want to implement VLSM on. Which subnet mask is the most efficient?()

A. 255.255.255.0
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

2.單項選擇題On the topic of VLSM, which one of the following statements best describes the concept of the route aggregation?()

A. Deleting unusable addresses through the creation of many subnets.
B. Combining routes to multiple networks into one supernet.
C. Reclaiming unused space by means of changing the subnet size.
D. Calculating the available host addresses in the AS.



3.單項選擇題Which one of the following varieties of NAT utilizes different ports to map multiple IP addresses to a single globally registered IP address?()

A. Static NAT
B. Port loading
C. NAT Overloading
D. Dynamic NAT
E. None of the above

4.單項選擇題A TestKing PC has the IP address 172.16.209.10 /22. What is the subnet of this address?()

A.172.16.42.0
B.172.16.107.0
C.172.16.208.0
D.172.16.252.0
E.172.16.254.0


最新試題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項選擇題

Which of the following describe router functions?()

題型:多項選擇題

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

題型:單項選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項選擇題

Which command is used to display the placement and direction of an IP access control list on a router?()

題型:單項選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項選擇題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項選擇題