A.addresses chosen by a company to communicate with the Internet
B.addresses that cannot be routed through the public Internet
C.addresses that can be routed through the public Internet
D.a scheme to conserve public addresses
E.addresses licensed to enterprises or ISPs by an Internet registry organization
您可能感興趣的試卷
你可能感興趣的試題
A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use
A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM
A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.
A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.
A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service
A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK
A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C.Configure many sub-interfaces on the same subnet.
D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
A.Allow users to develop their own approach to network security.
B.Physically secure network equipment from potential access by unauthorized individuals.
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E.Minimize network overhead by deactivating automatic antivirus client updates.
A.It has the same maximum hop count as version 1.
B.It uses broadcasts for its routing updates.
C.It is a classless routing protocol.
D.It has a lower default administrative distance than RIP version 1.
E.It supports authentication.
F.It does not send the subnet mask in updates.
最新試題
What is the default administrative distance of OSPF?()
How are VTP advertisements delivered to switches across the network?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
At which layer of the OSI model dose PPP perform?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Which IPsec security protocol should be used when confidentiality is required?()
Which pairing reflects a correct protocol-and-metric relationship?()
Which command is used to display the collection of OSPF link states?()
Which statement is true, as relates to classful or classless routing?()