單項(xiàng)選擇題Acknowledgements, sequencing, and flow control are characteristics of which OSI layer()。

A.Layer2
B.Layer3
C.Layer4
D.Layer5
E.Layer6
F.Layer7


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link()。

A.By default, all defined VLANs are allowed on the trunk.
B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D.Each single VLAN, or VLAN range, must be specified with the vlan database command.

2.單項(xiàng)選擇題What is one benefit of PVST+?()

A.PVST+reduces the CPU cycles for all the switches in the network
B.PVST+automatically selects the root bridge location,to provide optimiz…
C.PVST+allow the root switch location to be optimized per vlan.
D.PVST+supports Layer 3 load balancing without loops.

3.單項(xiàng)選擇題When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined()。

A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.

4.多項(xiàng)選擇題

Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? ()

A.The Router1 WAN port is configured as a trunking port.
B.The Router1 port connected to Switch1 is configured using subinterfaces.
C.The Router1 port connected to Switch1 is configured as 10 Mbps.
D.The Switch1 port connected to Router1 is configured as a trunking port.
E.The Switch1 port connected to Host B is configured as an access port.
F.The Switch1 port connected to Hub1 is configured as full duplex.

5.多項(xiàng)選擇題

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network?()

A.The subnet mask in use is 255.255.255.192.
B.The subnet mask in use is 255.255.255.128.
C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E.The LAN interface of the router is configured with one IP address.
F.The LAN interface of the router is configured with multiple IP addresses.

7.多項(xiàng)選擇題Which statements are true about EIGRP successor routes? ()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

8.單項(xiàng)選擇題What is one reason that WPA encryption is preferred over WEP()。

A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.

9.單項(xiàng)選擇題Which item represents the standard IP ACL?()

A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permitip any any
C.access-list 2500 deny tcp any host 192.168.1.1eq22
D.access-list 101 deny tcp any host 192.168.1.1

10.單項(xiàng)選擇題An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router()。

A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any