A.Star
B.Ring
C.Bus
D.Mesh
您可能感兴趣的试卷
你可能感兴趣的试题
A. Router routes traffic between different networks and a switch does not
B. The new switch is faulty and needs to be replaced and configured correctly
C. The firewall needs to be setup to allow traffic to reach the Internet
D. The switch needs to be setup to forward data traffic to the Internet
A.VLAN
B.Peer to Peer
C.VTP
D.VPN
A.DHCP
B.TCP/IP
C.NAT
D.SNMP
A.NAT
B.DNS
C.DHCP
D.PAT
A.Demarc
B.IDF
C.MDF
D.110 block
A. A record
B. NS record
C. CNAME record
D. MX record
A. Asset management
B. Change management
C. Cable management
D. Baselines
A.802.11a
B.802.11b
C.802.11g
D.802.11n
A.Telnet
B.TCP
C.SNMP
D.UDP
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:
Which of the following is the MOST likely cause of the slow connections?()
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
最新试题
Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()
A router that takes the workstations internal IP address and changes it to another IP address whenit sends the data outside of the network is an example of which of the following?()
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()
Which of the following protocols can be found at the application layer?()
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
Which of the following holds multiple connections and is usually maintained by the telephone company?()
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
Which of the following protocols requests membership to a multicast group?()
After a baseline check was completed it was noted that the network was working far below the level of the last baseline.Which of the following should the technician do NEXT to determine where the network problems are occurring?()
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).