多项选择题Which three of the following basic network services are provided by the Cisco IOS?()

A. Defines the network topology
B. Access to network resources
C. Routing and switching functions
D. Content Filtering
E. Intrusion Detection


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which of the commands below would you enter if you wanted to see the configuration register of your router?()

A. show boot
B. show flash
C. show register
D. show version
E. show config

3.多项选择题

A new switch is installed in the Testking network. This switch is to be configured sothat VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network.
Which of the conditions below have to be met in order for this to occur?()

A. The switch that will share the VLAN information must be in the VTP Server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be configured to use the same VTP version.
E. The switches must be configured to use the same STP version.
F. The switches must be configured to use the same type of ID tagging.
G. The switches must be connected over VLAN trunks.

4.单项选择题Which switching mode provides the highest level of integrity and error-free transport, rather then maximizing speed?()

A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering

6.单项选择题A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()

A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.

7.单项选择题Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.

8.单项选择题When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.

9.单项选择题What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()

A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable

10.多项选择题What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()

A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router

最新试题

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

题型:单项选择题

New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()

题型:单项选择题

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

题型:单项选择题

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

题型:多项选择题

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

题型:单项选择题

Which of the following contribute to congestion on an Ethernet network?()

题型:多项选择题

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

题型:多项选择题

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

题型:多项选择题

Which of the following options lists the steps in PPP session establishment in the correct order?()

题型:单项选择题

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

题型:多项选择题