A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.
您可能感興趣的試卷
你可能感興趣的試題
A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.
A.PPP
B.FDDI
C.Frame Relay PVC
D.NBMA
E.Frame Relay SVC
A. Microsegmentation decreases the number of collisions on the network.
B. if a switch receives a frame for an unkown destination,it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths,each switched aegment will contain one root bridge with all its ports in the forwarding state.All other switches in that broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.
A. show interfaces interface
B. show interfaces interface trunk
C. show interfaces interface switchport
D. show ip interface brief
E. show interfaces vlan
A. Router(config)#router ospf 1
B. Router(config)#router ospf 0
C. Router(config)#router ospf area 0
D. Router(config-router)#network 192.168.16.0 0.0.0.255 area 0
E. Router(config-router)#network 192.168.16.0 0.0.0.255 0
F. Router(config-router)#network 192.168.16.0 255.255.255.0 area 0
最新試題
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
What is the default administrative distance of OSPF?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which IPsec security protocol should be used when confidentiality is required?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which command encrypts all plaintext passwords?()
At which layer of the OSI model is RSTP used to prevent loops?()
Which command is used to display the collection of OSPF link states?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()