Ccna routing and Switching Complete Study Guide



Download 28,65 Mb.
Pdf ko'rish
bet63/1268
Sana31.12.2021
Hajmi28,65 Mb.
#227237
1   ...   59   60   61   62   63   64   65   66   ...   1268
Bog'liq
Todd Lammle-CCNA Routing and Switching Complete Study Guide Exam 100-105, Exam 200-105, Exam 200-125-Sybex (2016)

lxiii

24.  B.  Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See 

Chapter 14 for more information.



25.  A.  To enable OSPFv3, you enable the protocol at the interface level, as with RIPng. The 

command string is area-id. It’s important to understand that 

area 0 and area 0.0.0.0 

both describe 

area 0. See Chapter 19 for more information.

26.  C.  The command 

line console 0 places you at a prompt where you can then set your 

console user-mode password. See Chapter 6 for more information.

27.  B, D.  The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 

subnet bits and 9 host bits. The block size in the third octet is 2 (256–254). So this makes 

the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 

is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 

3.255. The valid host addresses are 2.1 through 3.254. See Chapter 4 for more information.

28.  C.  The IP address is configured under a logical interface, called a management domain or 

VLAN 1, by default. See Chapter 10 for more information.



29.  A.  256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 

64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid 

host range is the numbers in between, or 129–190. See Chapter 4 for more information.

30.  C.  An inside global address is considered to be the IP address of the host on the private 

 network after translation. See Chapter 13 for more information.



31.  B.  Once you create your pool, the command 

ip nat inside source must be used to say 

which inside locals are allowed to use the pool. In this question, we need to see if access  

list 100 is configured correctly, if at all, so 

show access-list is the best answer. See 

Chapter 13 for more information.




Download 28,65 Mb.

Do'stlaringiz bilan baham:
1   ...   59   60   61   62   63   64   65   66   ...   1268




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish