单项选择题
What is the purpose of a network mask?()
A. It is used to identify the maximum hop count of a subnetwork
B. It is used to identify an IP address as either private or public
C. It is used to identify the network to which an IP address belongs
D. It is used to identify the total number of bits present in an IP address
相关考题
-
单项选择题
Given the configuration and routing table in the exhibit, which routes will be advertised to OSPF neighbors because of the demo policy?()
A. 192.168.0.0/16 only
B. 192.168.0.0/17 only
C. 192.168.50.0/24 and 192.168.51.0/24
D. 192.168.0.0/17, 192.168.50.0/24 and 192.168.51.0/24 -
多项选择题
What are two valid match criteria for a routing policy?()
A. OSPF area ID
B. prefix list
C. port
D. time-to-live (TTL) -
多项选择题
Which two statements are true about the rescue configuration file?()
A. It must include a root password
B. It is roll back file number 50, and you can recover it by issuing rollback 50
C. It is created by issuing request system configuration rescue save
D. It is updated automatically when you commit
