A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use
您可能感興趣的試卷
你可能感興趣的試題
A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM
A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.
A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.
A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service
最新試題
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which command encrypts all plaintext passwords?()
Which pairing reflects a correct protocol-and-metric relationship?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which IPsec security protocol should be used when confidentiality is required?()
What is the purpose of the cisco Vlan Trunking protocol?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()