A. 158
B. 0x9D
C. 156
D. 157
E. 0x19
F. 0x9F
您可能感兴趣的试卷
你可能感兴趣的试题
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18
A. Device identifiers
B. Capabilities list
C. Platform
D. Route identifier
E. Neighbor traffic data
A. Switch
B. Router
C. NIC
D. hub
E. Repeater
F. RJ-45 transceiver
A. Switches are primarily software based while bridges are hardware based.
B. Both bridges and switches forward Layer 2 broadcasts.
C. Bridges are frequently faster than switches.
D. Switches typically have a higher number of ports than bridges.
E. Bridges define broadcast domain while switches define collision domains.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.
A. Broadcasts are not forwarded across the router.
B. All broadcasts are completely eliminated.
C. Adding a router to the network decreases latency.
D. Filtering can occur based on Layer 3 information.
E. Routers are more efficient than switches and will process the data more quickly.
F. None of the above.
A. The number of broadcast domains will be decreased.
B. It will make the broadcasting of traffic between domains more efficient between segments.
C. It will increase the number of collisions.
D. It will prevent segment 1's broadcasts from getting to segment 2.
E. It will connect segment 1's broadcasts to segment 2.
A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication
A. Hubs
B. Repeaters
C. Switches
D. Bridges
E. Routers
F. Media Converters
G. All of the above
最新试题
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
Which of the following statements regarding routed and routing protocols are true?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
Which statement describes the rule of split horizon?()