Which of the following can be concluded if a ping works between routers on either end of a serial link?
A) Both router's serial interfaces are in an up/up state.
B) The Layer 1 and 2 features of the link work.
C) Inbound ACLs on both routers filter packets successfully.
D) The routers understand that the neighboring router's IP address is in a different subnet.
A, B
Explanation: A) For the ping to succeed, it means Layer 1 and 2 features work, and both serial interfaces are in an up/up state. The routers should believe that they are in the same subnet, and there is no way to conclude that the ACLs are fully operational.
B) For the ping to succeed, it means Layer 1 and 2 features work, and both serial interfaces are in an up/up state. The routers should believe that they are in the same subnet, and there is no way to conclude that the ACLs are fully operational.
You might also like to view...
Which of the following best describes an intrusion prevention system?
A) Passive device that analyzes network traffic to detect unauthorized access B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules D) A device that monitors the characteristics of a single host and the events occurring on that host
What specific tool will display real time graphs, hard disk drive usage, CPU usage, network usage, and memory usage?
A) System Stability Index B) Resource Overview C) Computer Management D) Disk Management
Cycle is an example of one of the WordArt options that you can use to enhance a presentation
Indicate whether the statement is true or false
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. dictionary attack B. password C. firewall D. encryption