多项选择题
A. a stronger encryption algorithm B. key mixing using temporal keys C. shared key authentication D. a shorter initialization vector E. per frame sequence counters
Which three options are valid WAN connectivity methods?...
多项选择题Which three options are valid WAN connectivity methods?()
A.PPP B.WAP C.HDLC D.MPLS E.L2TPv3 F.ATM
If IP routing is enabled, which two commands set the ga...
多项选择题If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?()
A. ip default-gateway 0.0.0.0 B. ip route 172.16.2.1 0.0.0.0 0.0.0.0 C. ip default-network 0.0.0.0 D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1 E. ip route 0.0.0.0 0.0.0.0 172.16.2.1
Workstation A has been assigned an IP address of 192.0....
多项选择题Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()
A. Replace the straight-through cable with a crossover cable. B. Change the subnet mask of the hosts to /25. C. Change the subnet mask of the hosts to /26. D. Change the address of Workstation A to 192.0.2.15. E. Change the address of Workstation B to 192.0.2.111.