网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()
A. 0.0.0.0
B. 0.0.0.255
C. 0.0.255.255
D. 0.0.7.255
E. 0.0.3.255
F. None of the above
参考答案
更多 “ Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?() A. 0.0.0.0B. 0.0.0.255C. 0.0.255.255D. 0.0.7.255E. 0.0.3.255F. None of the above ” 相关考题
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
标准IP访问控制列表的基本格式为access-list[1ist number][permit|deny][host/any][sourceaddress][wild-card-mask][log],请填写其参数描述。a、list number…………………………………… ______b、permit/deny………………………………… ______c、source address……………………………… ______d、host/any…………………………………… ______e、windcad-mask……………………………… ______
考题
Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?()
A.255.255.255.224B.255.255.255.240C.255.255.255.248D.255.255.255.252
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64
考题
What will happen if a private IP address is assigned to a public interface connected to an ISP?()
A. Addresses in a private range will be not routed on the Internet backbone.B. Only the ISP router will have the capability to access the public network.C. The NAT process will be used to translate this address in a valid IP address.D. Several automated methods will be necessary on the private network.E. A conflict of IP addresses happens, because other public routers can use the same range.
考题
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0
考题
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?()
A.0.0.0.240B.255.255.255.252C.255.255.255.0D.255.255.255.224E.255.255.255.240
考题
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()
A.The subnet mask in use is 255.255.255.192.B.The subnet mask in use is 255.255.255.128.C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1E.The LAN interface of the router is configured with one IP address.F.The LAN interface of the router is configured with multiple IP addresses.
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A、14B、16C、30D、32E、62F、64
考题
Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()A、0.0.0.0B、0.0.0.255C、0.0.255.255D、0.0.7.255E、0.0.3.255F、None of the above
考题
The TestKing network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?()A、255.255.255.224B、255.255.255.248C、0.0.0.224D、0.0.0.8E、0.0.0.7F、0.0.0.3
考题
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?()A、0.0.0.240B、255.255.255.252C、255.255.255.0D、255.255.255.224E、255.255.255.240
考题
What will happen if a private IP address is assigned to a public interface connected to an ISP?()A、Addresses in a private range will be not routed on the Internet backbone.B、Only the ISP router will have the capability to access the public network.C、The NAT process will be used to translate this address in a valid IP address.D、Several automated methods will be necessary on the private network.E、A conflict of IP addresses happens, because other public routers can use the same range.
考题
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()A、Replace the straight-through cable with a crossover cable.B、Change the subnet mask of the hosts to /25.C、Change the subnet mask of the hosts to /26.D、Change the address of Workstation A to 192.0.2.15.E、Change the address of Workstation B to 192.0.2.111.
考题
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary format.B、A subnet mask specifies the portion of an IP address that is in a decimal format.C、A subnet mask specifies the portion of an IP address that represents a network prefix.D、A subnet mask specifies the portion of an IP address that represents network hosts.
考题
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts
考题
Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?()A、255.255.255.224B、255.255.255.240C、255.255.255.248D、255.255.255.252
考题
多选题Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()AThe subnet mask in use is 255.255.255.192.BThe subnet mask in use is 255.255.255.128.CThe IP address 172.16.1.25 can be assigned to hosts in VLAN1DThe IP address 172.16.1.205 can be assigned to hosts in VLAN1EThe LAN interface of the router is configured with one IP address.FThe LAN interface of the router is configured with multiple IP addresses.
考题
单选题The TestKing network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?()A
255.255.255.224B
255.255.255.248C
0.0.0.224D
0.0.0.8E
0.0.0.7F
0.0.0.3
考题
多选题Workstation A has been assigned an IP address of 192.0.2.24/28.Workstation B has been assigned an IP address of 192.0.2.100/28.The two workstations are connected with a straight-through cable.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()AReplace the straight-through cable with a crossover cableBChange the subnet mask of the hosts to /25CChange the subnet mask of the hosts to /26DChange the address of Workstation A to 192.0.2.15EChange the address of Workstation B to 192.0.2.111
考题
单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A
14B
16C
30D
32E
62F
64
考题
单选题Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()A
0.0.0.0B
0.0.0.255C
0.0.255.255D
0.0.7.255E
0.0.3.255F
None of the above
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?()A
255.255.255.224B
255.255.255.240C
255.255.255.248D
255.255.255.252
考题
单选题Which two statements are true of a network mask?()A
A subnet mask specifies the portion of an IP address that is in a binary formatB
A subnet mask specifies the portion of an IP address that is in a decimal formatC
A subnet mask specifies the portion of an IP address that represents a network prefixD
A subnet mask specifies the portion of an IP address that represetns network hosts
热门标签
最新试卷