A. FTP
B. TFTP
C. TCP
D. UDP
E. SCP
您可能感興趣的試卷
你可能感興趣的試題
A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.
D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
A. a router with subinterfaces configured on the physical interface that is connected to the switch
B. a router with an IP address on the physical interface connected to the switch
C. a switch with an access link that is configured between the switches
D. a switch with a trunk link that is configured between the switches
A. More collision domains will be created.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78
A. client
B. dynamic
C. server
D. static
E. transparent
最新試題
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Which IPsec security protocol should be used when confidentiality is required?()
Which statement describes the rule of split horizon?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
At which layer of the OSI model is RSTP used to prevent loops?()
On which options are standard access list based?()