多項(xiàng)選擇題What are three advantages of VLANs?()

A. VLANs establish broadcast domains in switched networks.
B. VLANs utilize packet filtering to enhance network security.
C. VLANs provide a method of conserving IP addresses in large networks.
D. VLANs provide a low-latency internet working alternative to routed networks.
E. VLANs allow access to network services based on department, not physical location.
F. VLANs can greatly simplify adding, moving, or changing hosts on the network.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements describe the Cisco implementation of VLANs?()

A. VLAN 1 is the default Ethernet VLAN.
B. CDP advertisements are only sent on VLAN 1002.
C. By default, the management VLAN is VLAN 1005.
D. By default, the switch IP address is in VLAN 1005.
E. VLAN 1002 through 1005 are automatically created and cannot be deleted.

2.多項(xiàng)選擇題What two things will a router do when running a distance vector routing protocol?()

A. Send periodic updates regardless of topology changes.
B. Send entire routing table to all routers in the routing domain.
C. Use the shortest-path algorithm to the determine best path.
D. Update the routing table based on updates from their neighbors.
E. Maintain the topology of the entire network in its database.

3.多項(xiàng)選擇題Which two Ethernet fiber-optic modes support distances of greater than 550 meters?()

A. 1000BASE-CX
B. 100BASE-FX
C. 1000BASE-LX
D. 1000BASE-SX
E. 1000BASE-ZX

4.多項(xiàng)選擇題What are two characteristics of RIPv2?()

A. classful routing protocol
B. variable-length subnet masks
C. broadcast addressing
D. manual route summarization
E. uses SPF algorithm to compute path

5.多項(xiàng)選擇題Which two wireless encryption methods are based on the RC4 encryption algorithm?()

A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP

6.多項(xiàng)選擇題Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()

A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters

7.多項(xiàng)選擇題Which three options are valid WAN connectivity methods?()

A.PPP
B.WAP
C.HDLC
D.MPLS
E.L2TPv3
F.ATM

8.多項(xiàng)選擇題If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?()

A. ip default-gateway 0.0.0.0
B. ip route 172.16.2.1 0.0.0.0 0.0.0.0
C. ip default-network 0.0.0.0
D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

9.多項(xiàng)選擇題Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.

10.多項(xiàng)選擇題Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0?()

A.113.10.4.0
B.186.54.3.0
C.175.33.3.255
D.26.35.2.255
E.17.35.36.0

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:?jiǎn)雾?xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:?jiǎn)雾?xiàng)選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model dose PPP perform?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is true, as relates to classful or classless routing?()

題型:?jiǎn)雾?xiàng)選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:?jiǎn)雾?xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:?jiǎn)雾?xiàng)選擇題