單項(xiàng)選擇題Which switching mode provides the highest level of integrity and error-free transport, rather then maximizing speed?()

A. 802.1q forwarding
B. VTP transparent mode
C. Cut-through
D. Store-and-forward
E. Fragment-free
F. Frame-filtering


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()

A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.

3.單項(xiàng)選擇題Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.

4.單項(xiàng)選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.

5.單項(xiàng)選擇題What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()

A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable

最新試題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()

題型:單項(xiàng)選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:單項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

題型:多項(xiàng)選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:單項(xiàng)選擇題

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

題型:單項(xiàng)選擇題

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

題型:單項(xiàng)選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項(xiàng)選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項(xiàng)選擇題