單項(xiàng)選擇題Acknowldgement, Sequencing, and Flow control are characteristics of which OSI layer?()

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?()

A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.

2.單項(xiàng)選擇題What is valid reason for a switch to deny port access to new devices when port security is enabled?()

A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.

3.單項(xiàng)選擇題What is the purpose using the traceroute command?()

A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.

4.單項(xiàng)選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

5.單項(xiàng)選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

6.單項(xiàng)選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.

7.單項(xiàng)選擇題How does using the service password encryption command on a router provide additional security? ()

A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router

8.單項(xiàng)選擇題What is the maximum data rate specified for IEEE 802.11b WLANs?()

A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps

10.單項(xiàng)選擇題Running both IPv4 and IPv6 on a router simultaneously is known as what?()

A. 4to6 routing
B. 6to4 routing
C. binary routing
D. dual-stack routing
E. NextGen routing

最新試題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項(xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項(xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項(xiàng)選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項(xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項(xiàng)選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:單項(xiàng)選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項(xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項(xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項(xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:單項(xiàng)選擇題