Question 81
An empty-configured MSR router is connected to the local LAN user through the GE0/0 interface, and directly connected to the remote router through the S1/0 interface. The IP addresses of GE0/0 interface and S1/0 interface are 10.1.1.1/24 and 172.16.1.1/30 respectively.
In order to ensure the intercommunication with remote LAN users, the following routes are configured on the MSR:
[MSR] ip route 10.20.0.0 255.255.255.0 s1/0
After the configuration, the MSR receives the data packet sent to the destination address 10.20.0.254/24. After the static route is found in the routing table, how will the MSR deal with the data packet next?
In order to ensure the intercommunication with remote LAN users, the following routes are configured on the MSR:
[MSR] ip route 10.20.0.0 255.255.255.0 s1/0
After the configuration, the MSR receives the data packet sent to the destination address 10.20.0.254/24. After the static route is found in the routing table, how will the MSR deal with the data packet next?
Question 82
There are two hops from the source device to the destination device. Use the tracert command to detect the path. When detecting the first hop, the source device sends a UDP packet with a TTL of 1 to the middle hop; when detecting the second hop, the source device sends a UDP packet with a TTL of 2, and the packet reaches the middle hop first, and the TTL is decremented When the message reaches the destination, the TTL will be decremented to 0. At this time, the destination device will send an ICMP_____ message to the source to inform the source device that it has tracked the destination address.
Question 83
The 802.11b protocol defines 14 channels in the 2.4GHz frequency band, and there is overlap in the frequency spectrum between adjacent channels.
In order to maximize the use of frequency band resources, which set of channels can be used for wireless coverage?
In order to maximize the use of frequency band resources, which set of channels can be used for wireless coverage?
Question 84
It is required to set a subnet mask to divide a class B network 172.16.0.0 into as many subnets as possible. Each subnet requires 500 hosts, so the subnet mask should be _____. (Dotted decimal format) slightly
Question 85
The two branches of XYZ company are interconnected by a synchronous dedicated line, and HDLC is used as the encapsulation protocol.
The correct statement about HDLC security is ______.
The correct statement about HDLC security is ______.