A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use
您可能感兴趣的试卷
你可能感兴趣的试题
A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM
A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.
A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.
A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service
A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK
A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C.Configure many sub-interfaces on the same subnet.
D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
A.Allow users to develop their own approach to network security.
B.Physically secure network equipment from potential access by unauthorized individuals.
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E.Minimize network overhead by deactivating automatic antivirus client updates.
A.It has the same maximum hop count as version 1.
B.It uses broadcasts for its routing updates.
C.It is a classless routing protocol.
D.It has a lower default administrative distance than RIP version 1.
E.It supports authentication.
F.It does not send the subnet mask in updates.
A.It establishes a static route to the 172.16.3.0 network.
B.It establishes a static route to the 192.168.2.0 network.
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E.It uses the default administrative distance.
F.It is a route that would be used last if other routes to the same destination exist.
最新试题
Which IPsec security protocol should be used when confidentiality is required?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
How are VTP advertisements delivered to switches across the network?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
Which command displays the CHAP authentication process as it occurs between two routers?()
At which layer of the OSI model is RSTP used to prevent loops?()
What is the purpose of the cisco Vlan Trunking protocol?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
On which options are standard access list based?()