多项选择题At which layers of the OSI model do WANs operate?()

A. application layer
B. session layer
C. transport layer
D. network layer
E. datalink layer
F. physical layer


您可能感兴趣的试卷

你可能感兴趣的试题

2.多项选择题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

3.多项选择题What functions do routers perform in a network?()

A. packet switching
B. access layer security
C. path selection
D. VLAN membership assignment
E. bridging between LAN segments
F. microsegmentation of broadcast domains

4.多项选择题Which of the following describe the process identifier that is used to run OSPF on a router?()

A. It is locally significant.
B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF database.
D. It is an optional parameter required only if multiple OSPF processes are running on the router.
E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

5.多项选择题To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?()

A. Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B. The VTP management domain name of both switches must be set the same.
C. All ports on both the switches must be set as access ports.
D. One of the two switches must be configured as a VTP server.
E. A rollover cable is required to connect the two switches together.
F. A router must be used to forward VTP traffic between VLANs.

6.多项选择题Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true?()

A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.
D. Router C will send a Destination Unreachable message type.
E. Router C will send a Router Selection message type.
F. Router C will send a Source Quench message type.

7.多项选择题When a DHCP server is configured, which two IP addresses should never be assignable to hosts?()

A. network or subnetwork IP address
B. broadcast address on the network
C. IP address leased to the LAN
D. IP address used by the interfaces
E. manually assigned address to the clients
F. designated IP address to the DHCP server

8.多项选择题Which two statements about the use of VLANs to segment a network are true?()

A. VLANs increase the size of collision domains.
B. VLANs allow logical grouping of users by function.
C. VLANs simplify switch administration.
D. VLANs enhance network security.

最新试题

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

题型:单项选择题

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

题型:单项选择题

What is the purpose of the cisco Vlan Trunking protocol?()

题型:单项选择题

Which command displays the CHAP authentication process as it occurs between two routers?()

题型:单项选择题

Which command encrypts all plaintext passwords?()

题型:单项选择题

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

题型:单项选择题

Which IPsec security protocol should be used when confidentiality is required?()

题型:单项选择题

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

题型:单项选择题

On which options are standard access list based?()

题型:单项选择题

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

题型:单项选择题