單項選擇題You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created?()

A.BSS
B.ESS
C.IBSS
D.SSID


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題During startup, the router displays the following error message: boot: cannot open "flash:" What will the router do next?()

A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM

2.單項選擇題What does the "Inside Global" address represent in the configuration of NAT?()

A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network

3.單項選擇題Which statement accurately describes a benefit provided by VTP?()

A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.

4.單項選擇題On which types of network will OSPF elect a backup designated router?()

A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess

5.單項選擇題Why would a network administrator configure port security on a switch?()

A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports

最新試題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題