A.RIP
B.0S:F
C.STP
D.EGP
您可能感兴趣的试卷
你可能感兴趣的试题
A.10GBase-ER
B.10GBase-LW
C.100Base-FX
D.1000Base-T
A.RCP
B.Telnet
C.RSH
D.SSH
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC.
Which of the following devices is the administrator plugged into? ()
A.Hub
B. Bridge
C. Switch
D. Router
A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch.
Which of the following settings on the switch will need to be configured to support the printer?()
A. MAC filtering
B. IP address
C. PoE
D. Port speed
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
A. Caching engines
B. QoS
C. Traffic shaping
D. Load balancing
A. Smart Jack
B. Demarc
C. 110 Block
D. 66 Block
A.100Base-T4
B.100Base-TX
C.100Base-X
D.100Base-FX
A. Packet sniffer
B. Multimeter
C. Load balancer
D. Throughput tester
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
最新试题
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()
Which of the following devices will allow a technician to measure the amount of data that is capable of traversing the network?()
Which of the following protocols can be found at the application layer?()
Which of the following would provide a technician with a performance reference point to refer backto after hardware repair?()
Which of the following uses a ring topology?()
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()
Which of the following protocols is commonly used for VoIP technology?()
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()
When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()