参考答案和解析
正确答案: D,F
解析: 暂无解析
更多“Identify three valid host addresses in the 192.168.27.0 netw”相关问题
  • 第1题:

    Which three IP addresses are valid multicast addresses?()

    A. 169.254.23.59

    B. 223.254.255.254

    C. 225.1.1.1

    D. 227.43.34.2

    E. 238.3.3.3

    F. 249.1.2.3


    参考答案:C, D, E

  • 第2题:

    Identify the four valid IPv6 addresses.()

    A.::

    B.::192:168:0:1

    C.2000::

    D.2001:3452:4952:2837::

    E.2002:c0a8:101::42

    F.2003:dead:beef:4dad:23:46:bb:101


    参考答案:A, B, E, F

  • 第3题:

    How does a DHCP server dynamically assign IP addresses to hosts?()

    A.Addresses are permanently assigned so that the host uses the same address at all times.

    B.Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned.

    C.Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease.

    D.Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.


    参考答案:C

  • 第4题:

    Identify the four valid IPv6 addresses.()

    • A、::
    • B、::192:168:0:1
    • C、2000::
    • D、2001:3452:4952:2837::
    • E、2002:c0a8:101::42
    • F、2003:dead:beef:4dad:23:46:bb:101

    正确答案:A,B,E,F

  • 第5题:

    In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()

    • A、ARP
    • B、RARP
    • C、TCP
    • D、UDP
    • E、IP
    • F、ICMP
    • G、BootP

    正确答案:C

  • 第6题:

    Which three IP addresses are valid multicast addresses?()

    • A、169.254.23.59
    • B、223.254.255.254
    • C、225.1.1.1
    • D、227.43.34.2
    • E、238.3.3.3
    • F、249.1.2.3

    正确答案:C,D,E

  • 第7题:

    Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet?()

    • A、192.168.20.29
    • B、192.168.20.16
    • C、192.168.20.17
    • D、192.168.20.31
    • E、192.168.20.0

    正确答案:A,C

  • 第8题:

    How dose a DHCP server dynamically assign IP address to host?()

    • A、Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
    • B、Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address must be made,and another address is then assigned.
    • C、Addresses are leased to host.A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.
    • D、Addresses are permanently assigned so that the host uses the same address at all times.

    正确答案:C

  • 第9题:

    You plan to deploy three Hyper-V servers named Server1 Server2, and Server3. Server1 will host three virtual machines (VMs), Server2 will host two VMs, and Server3 will host five VMs. All of the VMs will run Windows Server 2008 R2 Standard. You need to identify the minimum number and the type of licenses required for the planned deployment. The solution must minimize software costs. What should you identify?()

    • A、Three Windows Server 2008 R2 Enterprise licenses and one Windows Server 2008 R2 Standard license
    • B、Three Windows Server 2008 R2 Enterprise licenses
    • C、Three Windows Server 2008 R2 Standard licenses
    • D、Three Windows Server 2008 R2 Enterprise licenses and 10 Windows Server 2008 R2 Standard licenses

    正确答案:A

  • 第10题:

    多选题
    Which three IP addresses are valid multicast addresses?()
    A

    169.254.23.59

    B

    223.254.255.254

    C

    225.1.1.1

    D

    227.43.34.2

    E

    238.3.3.3

    F

    249.1.2.3


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    多选题
    In the output of show isis adjacency, what are three valid items that can be displayed under the attributes header?()
    A

    IS type

    B

    attached

    C

    overload

    D

    area addresses


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()
    A

    ARP

    B

    RARP

    C

    TCP

    D

    UDP

    E

    IP

    F

    ICMP

    G

    BootP


    正确答案: B
    解析: 暂无解析

  • 第13题:

    In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()

    A.ARP

    B.RARP

    C.TCP

    D.UDP

    E.IP

    F.ICMP

    G.BootP


    参考答案:C

  • 第14题:

    Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet?()

    A.192.168.20.29

    B.192.168.20.16

    C.192.168.20.17

    D.192.168.20.31

    E.192.168.20.0


    参考答案:A, C

  • 第15题:

    The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

    A.172.22.243.127

    B.172.22.243.191

    C.172.22.243.190

    D.10.16.33.98

    E.10.17.64.34

    F.192.168.1.160


    参考答案:C, D, E

  • 第16题:

    How does a DHCP server dynamically assign IP addresses to hosts?()

    • A、Addresses are permanently assigned so that the host uses the same address at all times.
    • B、Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned.
    • C、Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease.
    • D、Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.

    正确答案:C

  • 第17题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第18题:

    Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

    • A、192.168.27.33
    • B、192.168.27.112
    • C、192.168.27.119
    • D、192.168.27.126
    • E、192.168.27.175
    • F、192.168.27.208

    正确答案:A,C,D

  • 第19题:

    The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()

    • A、172.22.243.127
    • B、172.22.243.191
    • C、172.22.243.190
    • D、10.16.33.98
    • E、10.17.64.34
    • F、192.168.1.160

    正确答案:C,D,E

  • 第20题:

    In the output of show isis adjacency, what are three valid items that can be displayed under the attributes header?()

    • A、IS type
    • B、attached
    • C、overload
    • D、area addresses

    正确答案:A,B,C

  • 第21题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第22题:

    多选题
    The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
    A

    172.22.243.127

    B

    172.22.243.191

    C

    172.22.243.190

    D

    10.16.33.98

    E

    10.17.64.34

    F

    192.168.1.160


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Identify the four valid IPv6 addresses.()
    A

    ::

    B

    ::192:168:0:1

    C

    2000::

    D

    2001:3452:4952:2837::

    E

    2002:c0a8:101::42

    F

    2003:dead:beef:4dad:23:46:bb:101


    正确答案: E,B
    解析: 暂无解析