单项选择题You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created?()

A.BSS
B.ESS
C.IBSS
D.SSID


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题During startup, the router displays the following error message: boot: cannot open "flash:" What will the router do next?()

A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM

2.单项选择题What does the "Inside Global" address represent in the configuration of NAT?()

A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network

3.单项选择题Which statement accurately describes a benefit provided by VTP?()

A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.

4.单项选择题On which types of network will OSPF elect a backup designated router?()

A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess

5.单项选择题Why would a network administrator configure port security on a switch?()

A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports

6.单项选择题What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

A.permit all packets matching the first three octets of the source address to all destinations
B.permit all packets matching the last octet of the destination address and accept all source addresses
C.permit all packets from the third subnet of the network address to all destinations
D.permit all packets matching the host bits in the source address to all destinations
E.permit all packets to destinations matching the first three octets in the destination address

7.单项选择题A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()

A.Establish a direct link from the switch to all other switches in the network.
B.Assign the switch a higher MAC address than the other switches in the network have.
C.Configure the switch so that it has a lower priority than other switches in the network.
D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

8.单项选择题What is the purpose of the command shown below? vtp password Fl0r1da()。

A.It is used to validate the sources of VTP advertisements sent between switches.
B.It is used to access the VTP server to make changes to the VTP configuration.
C.It allows two VTP servers to exist in the same domain, each configured with different passwords.
D.It is the password required when promoting a switch from VTP client mode to VTP server mode.
E.It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

9.多项选择题What are two reasons a network administrator would use CDP? (Choose two.)()

A.to verify the type of cable interconnecting two devices
B.to determine the status of network services on a remote device
C.to obtain VLAN information from directly connected switches
D.to verify Layer 2 connectivity between two devices when Layer 3 fails
E.to obtain the IP address of a connected device in order to telnet to the device
F.to determine the status of the routing protocols between directly connected routers

10.单项选择题Why will a switch never learn a broadcast address?()

A.Broadcasts only use network layer addressing.
B.A broadcast frame is never forwarded by a switch.
C.A broadcast address will never be the source address of a frame.
D.Broadcast addresses use an incorrect format for the switching table.
E.Broadcast frames are never sent to switches.