A. Data Link
B. Session
C. Physical
D. Presentation
E. Network
F. Transport
您可能感興趣的試卷
你可能感興趣的試題
A. It encourages industry standardization by defining what functions occur at each layer of the model.
B. It necessitates changes in functionality in one layer to other layers.
C. It enables equipment efficiency from different vendors to use the same electronic components.
D. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
E. It supports the evolution of multiple competing standards, and thus enhances business equipment manufacturing opportunities.
A.RIP
B.STP
C.IGRP
D.CDP
E.VTP
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7
A.ARP
B.RARP
C.TCP
D.UDP
E.IP
F.ICMP
G.BootP
A. Two switches are connected via a trunk. Both switches have been assigned an IP address, subnet mask, and default gateway. A ping is successful between the two switches. However, VLAN information is not passed from one switch to the other switch.
B. A router and a switch have been assigned an IP address, a subnet mask, and a default gateway. They are directly connected, but a ping between the two devices fails.
C. A router connects to another router through a serial interface. Both routers have been assigned an IP address, subnet mask, and default gateway. The routers are running RIP and the networks directly connected to the first router do not pass to the second router. However, a ping from one router to the serial interface of the directly connected neighboring router is successful.
D. A router connects to another router via a switch. Both routers and the switch have been assigned an IP address, subnet mask, and default gateway. Neither the routers nor the switch are able to ping one of the hosts that is directly to the switch.
最新試題
Which of the following describe router functions?()
Which of the following contribute to congestion on an Ethernet network?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Which characteristics are representative of a link-state routing protocol?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()