单项选择题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()

A.Star
B.Ring
C.Bus
D.Mesh


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

A. Router routes traffic between different networks and a switch does not
B. The new switch is faulty and needs to be replaced and configured correctly
C. The firewall needs to be setup to allow traffic to reach the Internet
D. The switch needs to be setup to forward data traffic to the Internet

6.单项选择题Which of the following DNS record types provides the hostname to IP address mapping?()

A. A record
B. NS record
C. CNAME record
D. MX record

7.单项选择题Which of the following should be updated when new computers are purchased?()

A. Asset management
B. Change management
C. Cable management
D. Baselines

最新试题

Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()

题型:单项选择题

A router that takes the workstations internal IP address and changes it to another IP address whenit sends the data outside of the network is an example of which of the following?()

题型:单项选择题

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

题型:单项选择题

Which of the following protocols can be found at the application layer?()

题型:单项选择题

A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

题型:单项选择题

Which of the following holds multiple connections and is usually maintained by the telephone company?()

题型:单项选择题

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()

题型:单项选择题

Which of the following protocols requests membership to a multicast group?()

题型:单项选择题

After a baseline check was completed it was noted that the network was working far below the level of the last baseline.Which of the following should the technician do NEXT to determine where the network problems are occurring?()

题型:单项选择题

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).

题型:多项选择题