A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? ()
A.The Router1 WAN port is configured as a trunking port.
B.The Router1 port connected to Switch1 is configured using subinterfaces.
C.The Router1 port connected to Switch1 is configured as 10 Mbps.
D.The Switch1 port connected to Router1 is configured as a trunking port.
E.The Switch1 port connected to Host B is configured as an access port.
F.The Switch1 port connected to Hub1 is configured as full duplex.
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network?()
A.The subnet mask in use is 255.255.255.192.
B.The subnet mask in use is 255.255.255.128.
C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E.The LAN interface of the router is configured with one IP address.
F.The LAN interface of the router is configured with multiple IP addresses.
A.WAN switch
B.PVC
C.ATM switch
D.multiplexer
E.CSU/DSU
F.modem
A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permitip any any
C.access-list 2500 deny tcp any host 192.168.1.1eq22
D.access-list 101 deny tcp any host 192.168.1.1
A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
Which routing protocols can be used within the enterprise network shown in the diagram? ()
A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP
A.A CSU/DSU terminates a digital local loop
B.A modem terminates a digital local loop
C.A CSU/DSU terminates an analog local loop
D.A modem terminates an analog local loop
E.A router is commonly considered a DTE device
F.A router is commonly considered a DCE device
A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer
最新試題
OSI 模型的哪兩項(xiàng)功能在第2層實(shí)現(xiàn)?()
請(qǐng)參見(jiàn)圖示。哪種邏輯拓?fù)涫菍?duì)圖示網(wǎng)絡(luò)的準(zhǔn)確描述?()
請(qǐng)參見(jiàn)圖示。對(duì)于從主機(jī)A 向Web 服務(wù)器發(fā)出的網(wǎng)頁(yè)請(qǐng)求,正確的目的套接字?jǐn)?shù)字是什么?()
請(qǐng)參見(jiàn)圖示。網(wǎng)絡(luò)中的所有設(shè)備均使用默認(rèn)配置。此拓?fù)渲行枰嗌賯€(gè)邏輯地址范圍?()
要將數(shù)據(jù)包發(fā)送到遠(yuǎn)程網(wǎng)絡(luò),應(yīng)使用哪種設(shè)備?()
下列哪些是私有IP 地址的地址范圍?()
請(qǐng)參見(jiàn)圖示。主機(jī)A 和B 無(wú)法互相通信。此問(wèn)題的原因是什么?()
請(qǐng)參見(jiàn)圖示。一臺(tái)主機(jī)正使用NAT 連接到Internet。下列哪三項(xiàng)IP 地址可實(shí)現(xiàn)此連接?()
請(qǐng)參見(jiàn)圖示。主機(jī)X 和主機(jī)Y 與本地網(wǎng)絡(luò)的通信受到限制。此問(wèn)題的原因是什么?()
請(qǐng)參見(jiàn)圖示。主機(jī)B 嘗試與主機(jī)C 建立TCP/IP 會(huì)話。在嘗試期間,San Francisco 器由器的FastEthernet 接口fa0/1捕獲到一個(gè)幀。捕獲的幀中包含源IP 地址為10.10.1.2而目的IP 地址為10.31.1.20的數(shù)據(jù)包。捕獲該幀時(shí),它的目的MAC 地址是什么?()