多項(xiàng)選擇題
A.The data is moving from 10BASE-TX to 100BASE-TX. B.The WAN encapsulation type has changed. C.The data format has changed from analog to digital. D.The source and destination hosts are in the same subnet. E.The source and destination MAC addresses have changed.
單項(xiàng)選擇題
A.Set the SSID value in the client software to public. B.Configure open authentication on the AP and the client. C.Set the SSID value on the client to the SSID configured on the AP. D.Configure MAC address filtering to permit the client to connect to the AP.
A.application layer B.session layer C.transport layer D.network layer E.datalink layer F.physical layer
A.HDLC B.Ethernet C.Token Ring D.PPP E.FDDI F.Frame Relay
A.a directly connected interface with an address of 192.168.10.254/24 B.a static route to network 192.168.10.0/24 C.a RIP update for network 192.168.10.0/24 D.an OSPF update for network 192.168.0.0/16 E.a default route with a next hop address of 192.168.10.1 F.a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop
A.A CSU/DSU terminates a digital local loop. B.A modem terminates a digital local loop. C.A CSU/DSU terminates an analog local loop. D.A modem terminates an analog local loop. E.A router is commonly considered a DTE device. F.A router is commonly considered a DCE device.
A.Switches are primarily software based while bridges are hardware based. B.Both bridges and switches forward Layer 2 broadcasts. C.Bridges are frequently faster than switches. D.Switches have a higher number of ports than most bridges. E.Bridges define broadcast domains while switches define collision domains. F.Both bridges and switches make forwarding decisions based on Layer 2 addresses.
A.addresses chosen by a company to communicate with the Internet B.addresses that cannot be routed through the public Internet C.addresses that can be routed through the public Internet D.a scheme to conserve public addresses E.addresses licensed to enterprises or ISPs by an Internet registry organization
A.during high traffic periods B.after broken links are re-established C.when upper-layer protocols require high reliability D.in an improperly implemented redundant topology E.when a dual ring topology is in use
A.TFTP server, Flash, NVRAM B.ROM, NVRAM, TFTP server C.NVRAM, TFTP server, ROM D.Flash, TFTP server, ROM E.Flash, NVRAM, ROM
A.a primary route,stored in the routing table B.a backup route,stored in the routing table C.a backup route,stored in the topology table D.a primary route,stored in the topology table