單項選擇題

Following ticket consists of a problem description and existing configuration on the device.

Figure 1

Figure 2
Trouble Ticket Statement
Client 1 is not able to reach the WebServer. Initial troubleshooting shows that DSW1 can ping the Fa0/1interface of R4 but not the s0/0/0/0.34 interface.
Configurationon DSW1
router eigrp 10
network 10.1.4.4 0.0.0.0
network 10.2.1.1 0.0.0.0
network 10.2.4.13 0.0.0.0
no auto-summary
Configurationon DSW2
router eigrp 10
network 10.1.4.8 0.0.0.0
network 10.2.2.1 0.0.0.0
network 10.2.4.14 0.0.0.0
no auto-summary
Configurationon R4
router eigrp 10
network 10.1.4.5 0.0.0.0
no auto-summary
redistribute ospf 1 metric 100 10 255 1 1500 route-map EIGRP_to_OSPF!
router ospf 1
network 10.1.1.8 0.0.0.0 area 34
redistribute eigrp 10 subnets!
route-map EIGRP→OSPF
match ip address 1!
access-list 1 permit 10.0.0.0 0.255.255.255
access-list 1 permit 209.0.0.0 0.255.255.255
On Which device is the fault condition located?()

A.DSW1
B.DSW2
C.Client 1
D.R4


您可能感興趣的試卷

你可能感興趣的試題

最新試題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:問答題

Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()

題型:多項選擇題

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:單項選擇題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:問答題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:問答題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()

題型:多項選擇題