單項(xiàng)選擇題

The network setup for this trouble ticket is shown in Figure 3.
Trouble Ticket Statement
DSW1 and R4 cannot ping R2’s loopback or R2’s s0/0/0/0.12 IPv6 address. Initial troubleshooting showsand R2 is not an OSPFv3 neighbor on R3.
Configurationon R2
ipv6 unicast-routing!
ipv6 router ospf 6
router-id 2.2.2.2!
interface s0/0/0/0.23
ipv6 address 2026::1:1/122
ConfigurationR3
ipv6 unicast-routing!
ipv6 router ospf 6
router-id 3.3.3.3!
interface s0/0/0/0.23
ipv6 address 2026::1:2/122
ipv6 ospf 6 area 0

Figure 3
What is the solution of the fault condition?()

A.Add ipv6 ospf 6 area 0 under S0/0/0/0.23 on R2
B.Add ipv6 ospf 6 area 6 under s0/0/0/0.23 on R2
C.Remove IPv6 address from s0/0/0/0.23 on R2
D.Enable IPv6 routing on s0/0/0/0.23 on R2


您可能感興趣的試卷

你可能感興趣的試題

最新試題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:?jiǎn)柎痤}

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:?jiǎn)柎痤}

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:?jiǎn)柎痤}

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項(xiàng)選擇題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:?jiǎn)雾?xiàng)選擇題

A new router was configured with the following commands:The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

題型:?jiǎn)雾?xiàng)選擇題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about PPPoA configuration is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:?jiǎn)柎痤}

Which statement correctly describes IPsec VPN backup technology?()

題型:?jiǎn)雾?xiàng)選擇題