多項選擇題Which three of the following basic network services are provided by the Cisco IOS?()

A. Defines the network topology
B. Access to network resources
C. Routing and switching functions
D. Content Filtering
E. Intrusion Detection


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of the commands below would you enter if you wanted to see the configuration register of your router?()

A. show boot
B. show flash
C. show register
D. show version
E. show config

3.多項選擇題

A new switch is installed in the Testking network. This switch is to be configured sothat VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.
Which of the conditions below have to be met in order for this to occur?()

A. The switch that will share the VLAN information must be in the VTP Server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be configured to use the same VTP version.
E. The switches must be configured to use the same STP version.
F. The switches must be configured to use the same type of ID tagging.
G. The switches must be connected over VLAN trunks.

4.單項選擇題Which switching mode provides the highest level of integrity and error-free transport, rather then maximizing speed?()

A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering

6.單項選擇題A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()

A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.

7.單項選擇題Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.

8.單項選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.

9.單項選擇題What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()

A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable

10.多項選擇題What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()

A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router

最新試題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:單項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:單項選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:單項選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項選擇題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項選擇題

What is a global command?()

題型:單項選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項選擇題

Which of the following host addresses are member of networks that can be routed across the public Internet? ()

題型:多項選擇題