單項選擇題Which of the addresses below is an example of a valid unicast address?()

A.172.31.128.255./18
B.255.255.255.255
C.192.168.24.59/30
D.224.0.0.5
E.All of the above


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?()

A. Gateway DP
B. Reverse ARP
C. proxy ARP
D. Inverse ARP
E. indirect ARP

2.單項選擇題Which of the following processes, is used to find the hardware address of a LAN device?()

A. Inverse-ARP
B. Reverse-ARP
C. Proxy ARP
D. ARP

3.多項選擇題Which of the following are actual varieties of network crosstalk?()

A. near-end crosstalk(NEXT)
B. middle open-end crosstalk(MOEXT)
C. power sum near-end crosstalk(PSNEXT)
D. jitterry crosstalk(JEXT)
E. far end crosstalk(FEXT)

5.單項選擇題What is the maximum data rate specified by the IEEE 802.11B standard for wireless LANS?()

A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
E. none of the above

最新試題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項選擇題

Which of the following describe router functions?()

題型:多項選擇題

Which of the following options lists the steps in PPP session establishment in the correct order?()

題型:單項選擇題

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

題型:多項選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:單項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項選擇題

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

題型:單項選擇題