To allow or prevent load balancing to network 172.16.3.0/24, which of the following commands could be used in R2? (Choose two.)
To allow or prevent load balancing to network 172.16.3.0/24, which of the following commands could be used in R2? (Choose two.) A . R2(config-if)#clock rateB . R2(config-if)#bandwidthC . R2(config-if)#ip ospf costD . R2(config-if)#ip ospf priorityE . R2(config-router)#distance ospfView AnswerAnswer: BC Explanation: http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094e9e.sht ml#t6 The cost (also called metric) of an...
How many collision domains are present in this network?
Refer to the exhibit. All devices attached to the network are shown. How many collision domains are present in this network?A . 2B . 3C . 6D . 9E . 15View AnswerAnswer: E Explanation: A switch uses a separate collision domain for each port so there are a total of...
Which statements are true regarding ICMP packets? (Choose two.)
Which statements are true regarding ICMP packets? (Choose two.)A . They acknowledge receipt of TCP segments.B . They guarantee datagram delivery.C . TRACERT uses ICMP packets.D . They are encapsulated within IP datagrams.E . They are encapsulated within UDP datagrams.View AnswerAnswer: CD Explanation: Ping may be used to find out...
Why do large OSPF networks use a hierarchical design? (Choose three.)
Why do large OSPF networks use a hierarchical design? (Choose three.)A . to decrease latency by increasing bandwidthB . to reduce routing overheadC . to speed up convergenceD . to confine network instability to single areas of the networkE . to reduce the complexity of router configurationF . to lower...
What should be part of a comprehensive network security plan?
What should be part of a comprehensive network security plan?A . Allow users to develop their own approach to network security.B . Physically secure network equipment from potential access by unauthorized individuals.C . Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D...
Which router command will configure an interface with the IP address 10.10.80.1/19?
Which router command will configure an interface with the IP address 10.10.80.1/19?A . router(config-if)# ip address 10.10.80.1/19B . router(config-if)# ip address 10.10.80.1 255.255.0.0C . router(config-if)# ip address 10.10.80.1 255.255.255.0D . router(config-if)# ip address 10.10.80.1 255.255.224.0E . router(config-if)# ip address 10.10.80.1 255.255.240.0F . router(config-if)# ip address 10.10.80.1 255.255.255.240View AnswerAnswer: D Explanation:
Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three)
Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three)A . static mapping of IPv4 address to IPv6 addressesB . configuring IPv4 tunnels between IPv6 islandsC . use DHCPv6 to map IPv4 addresses to IPv6 addressesD . use proxying and translation...
When configuring NAT, the Internet interface is considered to be what?
When configuring NAT, the Internet interface is considered to be what?A . localB . insideC . globalD . outsideView AnswerAnswer: D Explanation: Network address translation or NAT requires the Internet to be considered as an outside interface else it won't serve the purpose it intends to.
What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?
A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?A . HTTPB . DNSC . DHCPD . RARPE . ARPView AnswerAnswer: E
If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?
Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?A . 10.168.10.99B . 10.168.11.88C . A1:A1:A1:A1:A1:A1D . B2:B2:B2:B2:B2:B2E . C3:C3:C3:C3:C3:C3F . D4:D4:D4:D4:D4:D4View AnswerAnswer: E Explanation: When packets transfer from one host...