單項(xiàng)選擇題

The network setup for this trouble ticket is shown in Figure 3.
Trouble Ticket Statement
DSW1 and R4 cannot ping R2’s loopback or R2’s s0/0/0/0.12 IPv6 address. Initial troubleshooting shows and R2 is not an OSPFv3 neighbor on R3.
Configurationon R2
ipv6 unicast-routing!
ipv6 router ospf 6
router-id 2.2.2.2!
interface s0/0/0/0.23
ipv6 address 2026::1:1/122
ConfigurationR3
ipv6 unicast-routing!
ipv6 router ospf 6
router-id 3.3.3.3!
interface s0/0/0/0.23
ipv6 address 2026::1:2/122
ipv6 ospf 6 area 0

Figure 3
The Fault Condition is related to which technology?()

A.IPv6 Addressing
B.Route Redistribution
C.OSPFv3
D.RIPng


您可能感興趣的試卷

你可能感興趣的試題

最新試題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clicking the numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible.To gain access to either the topology or the SDK click on the button to left side of the screen thatcorresponds to the section you wish to access. When you have finished viewing the topology theSDK you can return to your questions by clicking on the Questions button to the left.Which defined peer IP address an local subnet belong to Crete?()

題型:多項(xiàng)選擇題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:?jiǎn)雾?xiàng)選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:?jiǎn)柎痤}

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:?jiǎn)雾?xiàng)選擇題

Match the xDSL type on the above to the most appropriate implementation on the below.

題型:?jiǎn)柎痤}

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:?jiǎn)柎痤}

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:?jiǎn)雾?xiàng)選擇題

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

題型:?jiǎn)雾?xiàng)選擇題