单项选择题Which PPP subprotocol negotiates authentication options?()

A.NCP
B.ISDN
C.SLIP
D.LCP
E.DLCI


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题What is the purpose of Spanning Tree Protocol?()

A. to prevent routing loops
B. to create a default route
C. to provide multiple gateways for hosts
D. to maintain a loop-free Layer 2 network topology
E. to enhance the functions of SNMP

3.单项选择题What is the function of the CSMA/CD algorithm in Ethernet technologies?()

A. defines how the media is accessed
B. supplies a token to determine which host has access to the media
C. defines the encoding of electrical signals on the wire
D. determines the preamble bits

4.单项选择题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()

A. path cost
B. lowest port MAC address
C. VTP revision number
D. highest port priority number
E. port priority number and MAC address

5.单项选择题What is the purpose of the OSPF router ID in a OR/BOR election?()

A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
B. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
C. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
D. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers

6.单项选择题A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()

A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief

7.单项选择题How can an administrator determine if a router has been configured when it is first powered up?()

A. A configured router prompts for a password
B. A configured router goes to the privileged mode prompt
C. An un configured router goes into the setup dialog
D. An un configured router goes to the enable mode prompt


8.单项选择题When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()

A. when all switches have the same BID as the root switch
B. when all switches have received the MAC address of each neighboring switch
C. when every enabled switch port has been assigned a unique identifier
D. when every operating switch port is in either the blocking or forwarding state
E. when all switches are in either client, server, or transparent mode

9.单项选择题At a branch location, TestKing.com has deployed a non modular router that is equipped with two serial interfaces and two Ethernet interfaces.What additional equipment must be used to allow the branch office to connect to the central office by using an ISDN service?()

A. a serial cable with a V.35 to RJ45 adapter
B. a CSU/DSU
C. an external ISDN TA and NT1
D. The non-modular router cannot connect to an ISDN service. The network administrator must purchase a modular router with an ISDN BRI-U card.

10.单项选择题At a branch location, TestKing.com has deployed a non modular router that is equipped with two serial interfaces and two Ethernet interfaces.What additional equipment must be used to allow the branch office to connect to the central office by using an ISDN service?()

A. a serial cable with a V.35 to RJ45 adapter
B. a CSU/DSU
C. an external ISDN TA and NT1
D. The non-modular router cannot connect to an ISDN service. The network administrator must purchase a modular router with an ISDN BRI-U card.

最新试题

Which of the following host addresses are member of networks that can be routed across the public Internet? ()

题型:多项选择题

What is the purpose of typing o/r 0x2142 during a password recover procedure on a 2500 series router?()

题型:单项选择题

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

题型:单项选择题

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

题型:多项选择题

What feature of a networks switch allows an administrative to create separate broadcast domains?()

题型:单项选择题

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

题型:单项选择题

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

题型:多项选择题

Which characteristics are representative of a link-state routing protocol?()

题型:多项选择题

Which command is used to display the placement and direction of an IP access control list on a router?()

题型:单项选择题

Which of the following correctly describe steps in the OSI data encapsulation process?()

题型:多项选择题