單項(xiàng)選擇題How would the number 172 be expressed in binary form?()

A.10010010
B.10011001
C.10101100
D.10101110


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題How would the number 231 be expressed as a binary number?()

A. 11011011
B. 11110011
C. 11100111
D. 11111001
E. 11010011

2.單項(xiàng)選擇題Which one of the binary number ranges shown below corresponds to the value of the first octet in Class B address range?()

A. 10000000-11101111
B. 11000000-11101111
C. 10000000-10111111
D. 10000000-11111111
E. 11000000-10111111

4.多項(xiàng)選擇題You have the binary number 10011101. Convert it to its decimal and hexadecimal equivalents.()

A. 158
B. 0x9D
C. 156
D. 157
E. 0x19
F. 0x9F

5.單項(xiàng)選擇題If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs?()

A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18

6.多項(xiàng)選擇題CDP is running between two TestKing devices. What information is supplied by CDP?()

A. Device identifiers
B. Capabilities list
C. Platform
D. Route identifier
E. Neighbor traffic data

7.多項(xiàng)選擇題Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment?()

A. Switch
B. Router
C. NIC
D. hub
E. Repeater
F. RJ-45 transceiver

8.多項(xiàng)選擇題With regard to bridges and switches, which of the following statements are true?()

A. Switches are primarily software based while bridges are hardware based.
B. Both bridges and switches forward Layer 2 broadcasts.
C. Bridges are frequently faster than switches.
D. Switches typically have a higher number of ports than bridges.
E. Bridges define broadcast domain while switches define collision domains.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

9.多項(xiàng)選擇題Which of the following are benefits of segmenting a network with a router?()

A. Broadcasts are not forwarded across the router.
B. All broadcasts are completely eliminated.
C. Adding a router to the network decreases latency.
D. Filtering can occur based on Layer 3 information.
E. Routers are more efficient than switches and will process the data more quickly.
F. None of the above.

10.單項(xiàng)選擇題The Testking corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?()

A. The number of broadcast domains will be decreased.
B. It will make the broadcasting of traffic between domains more efficient between segments.
C. It will increase the number of collisions.
D. It will prevent segment 1's broadcasts from getting to segment 2.
E. It will connect segment 1's broadcasts to segment 2.

最新試題

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

題型:單項(xiàng)選擇題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項(xiàng)選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:單項(xiàng)選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項(xiàng)選擇題

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

題型:多項(xiàng)選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項(xiàng)選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項(xiàng)選擇題

What is a global command?()

題型:單項(xiàng)選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:單項(xiàng)選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題