A.Network security
B.Content networking
C.Network management
D.Campus local-area networking
您可能感興趣的試卷
你可能感興趣的試題
A.Virus
B.Worm
C.Trojan
D.Executable
A.It reads the Layer-5 information and sends the message directly to the intended computer.
B.It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.
C.It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
D.It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.
A.IP telephones
B.Voice gateways
C.Call management software
D.Media Convergence Servers (MCSs)
A.QoS
B.Centrex
C.Packet encryption
D.Intelligent call routing
A.Because data does not need to arrive intact, so data transfer rates can be variable
B.Because lost voice-data packets must be retransmitted
C.Because voice data packets should arrive quickly and sequentially, and with no lost data
D.Because voice data packets must follow a single dedicated path through the network
最新試題
What are three benefit that the Smart Business Architecture provides to customers?()
What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
Which two Internet Protocol (IP) telephony devices are best categorized as infrastructurecomponents?()
Which tool provides A complete guide that makes it easier for partners, regardless of theirexperience level, to sell cisco unified communications solutions to their customers?()
How does a switch respond when it receives a message?()
Small businesses face unique customer challenges, which three challenges are small businesseslooking to overcome?()
What are three benefit that the Smart Business Architecture provides to customers?()
Which device is used in wireless networks to send transmissions to a target area?()
What feature does the Partner E-Learning Connection provide?()
Which network technology addresses these customer business needs: shrinking budgets and ITstaffs, more complex networks, and an increased need for network security?()