單項(xiàng)選擇題Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-insecurity mechanisms?()

A.Frame Relay
B.HDLC
C.x.25
D.PPP


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two values are used by Spanning Tree Protocol to elect a root bridge?()

A.amount of RAM
B.bridge priority
C.IOS version
D.IP address
E.MAC address
F.speed of the links

2.多項(xiàng)選擇題What are two advantages of Layer 2 Ethernet switches over hubs?()

A.decreasing the number of collision domains
B.filtering frames based on MAC addresses
C.allowing simultaneous frame transmissions
D.increasing the size of broadcast domains
E.increasing the maximum length of UTP cabling between devices

3.多項(xiàng)選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。

A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10

4.單項(xiàng)選擇題

Refer to the exhibit.Based on the exhibited routing table,how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?()

A.The router will forward packets from R3 to R2 to R1
B.The router will forward packets from R3 to R1
C.The router will forward packets from R3 to R1 to R2
D.The router will forward packets from R3 to R2 to R1 AND from R3 to R1

5.多項(xiàng)選擇題

The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()

 

A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8

6.單項(xiàng)選擇題

Refer to the exhibit.Which is the most efficient summarization that R1 can use to advertise its networks toR2?()

A.172.1.4.0/22
B.172.1.0.0/21
C.172.1.0.0/22
D.172.1.4.0/25  172.1.4.128/25  172.1.5.0/24  172.1.6.0/24  172.1.7.0/24
E.172.1.4.0/24  172.1.5.0/24  172.1.6.0/24  172.1.7.0/24

7.多項(xiàng)選擇題Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?()

A.It establishes a static route to the 172.16.3.0 network.
B.It establishes a static route to the 192.168.2.0 network.
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E.It uses the default administrative distance.
F.It is a route that would be used last if other routes to the same destination exist.

8.多項(xiàng)選擇題What are two benefits of using VTP in a switching environment?()

A.It allows switches to read frame tags.
B.It allows ports to be assigned to VLANs automatically.
C.It maintains VLAN consistency across a switched network.
D.It allows frames from multiple VLANs to use a single interface.
E.It allows VLAN information to be automatically propagated throughout the switching environment.

9.多項(xiàng)選擇題Which two are advantages of static routing when compared to dynamic routing?()

A.Security increases because only the network administrator may change the routing tables.
B.Configuration complexity decreases as network size increases.
C.Routing updates are automatically sent to neighbors.
D.Route summarization iscompued automatically by the router.
E.Routing traffic load is reduced when used in stub network links.
F.An efficient algorithm is used to build routing tables,using automatic updates.
G.Routing tables adapt automatically to topology changes.

10.單項(xiàng)選擇題In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switchedLAN?()

A.after broken links are re-established
B.in an improperly implemented redundant topology
C.when upper-layer protocols require high reliability
D.during high traffic periods
E.when a dual ring topology is in use

最新試題

請(qǐng)參見圖示。公司路由器由于故障被更換。更換路由器之后,Education 辦公室內(nèi)的主機(jī)C 和D 能夠相互ping 通,但是無(wú)法訪問(wèn)Accounts 辦公室內(nèi)的主機(jī)。此問(wèn)題的原因可能是什么?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。網(wǎng)絡(luò)技術(shù)人員試圖確定主機(jī)A 的正確IP 地址配置。以下哪一項(xiàng)是主機(jī)A 的有效配置?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。某用戶想要查看當(dāng)前的配置。圖中所示為ipconfig/all 命令的輸出。從此輸出可以得到哪三項(xiàng)結(jié)論?()

題型:多項(xiàng)選擇題

請(qǐng)參見圖示。哪種邏輯拓?fù)涫菍?duì)圖示網(wǎng)絡(luò)的準(zhǔn)確描述?()

題型:?jiǎn)雾?xiàng)選擇題

何時(shí)必須使用clock rate 命令配置路由器串行接口?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。在網(wǎng)絡(luò)中,PC1向PC2發(fā)送了一條消息。PC2收到的幀如圖所示。該幀中的哪一信息確定了正確的目的應(yīng)用程序?()

題型:?jiǎn)雾?xiàng)選擇題

傳輸層如何讓主機(jī)能同時(shí)針對(duì)不同應(yīng)用程序維護(hù)多個(gè)通信流?()

題型:?jiǎn)雾?xiàng)選擇題

下列哪些是私有IP 地址的地址范圍?()

題型:多項(xiàng)選擇題

請(qǐng)參見圖示。對(duì)于從主機(jī)A 向Web 服務(wù)器發(fā)出的網(wǎng)頁(yè)請(qǐng)求,正確的目的套接字?jǐn)?shù)字是什么?()

題型:?jiǎn)雾?xiàng)選擇題

請(qǐng)參見圖示。主機(jī)A 嘗試與主機(jī)C 建立TCP/IP 會(huì)話。在嘗試期間,路由器Y 的FastEthernet 接口fa0/1捕獲到一個(gè)幀。捕獲的幀中包含源IP 地址為172.16.1.5而目的IP 地址為172.16.7.24的數(shù)據(jù)包。捕獲該幀時(shí),它的源MAC 地址是什么?()

題型:?jiǎn)雾?xiàng)選擇題