What is the most likely cause of the problem?
Refer to the exhibit. A user cannot reach any web sites on the Internet, but others in the department are not having a problem. What is the most likely cause of the problem?A . IP routing is not enabled.B . The default gateway is not in the same subnet.C ....
How many bits are contained in each field of an IPv6 address?
How many bits are contained in each field of an IPv6 address?A . 24B . 4C . 8D . 16View AnswerAnswer: D Explanation: http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8026003d.pdf One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented...
Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.)
Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.)A . router#show versionB . router#show ip interfaceC . router#show protocolsD . router#show controllersE . router#show running-configView AnswerAnswer: BC
Which commands will correct this issue?
The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue? A . Option AB . Option BC . Option CD . Option DE . Option EView AnswerAnswer: B Explanation: Do a “show ip int brief” and you will see that Fa0/1...
Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?
Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?A . HTTPB . IPC . TCPD . TelnetE . UDPView AnswerAnswer: E Explanation: UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams....
Why would a network administrator configure port security on a switch?
Why would a network administrator configure port security on a switch?A . to prevent unauthorized Telnet access to a switch portB . to prevent unauthorized hosts from accessing the LANC . to limit the number of Layer 2 broadcasts on a particular switch portD . block unauthorized access to the...
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)A . hello packetsB . SAP messages sent by other routersC . LSAs from other routersD . beacons received on point-to-point linksE . routing tables received from other link-state routersF . TTL...
What addresses will populate these packets as they are forwarded from Router1 to Router2?
Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? A . Option AB . Option BC ....
What should be done to correct this situation?
Refer to the exhibit. The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation?A . Verify that the DNS server address is correct in the DHCP pool.B . Ping the...
What is the subnet address of 172.16.159.159/22?
What is the subnet address of 172.16.159.159/22?A . 172.16.0.0B . 172.16.128.0C . 172.16.156.0D . 172.16.159.0E . 172.16.159.128F . 172.16.192.0View AnswerAnswer: C Explanation: Converting to binary format it comes to