多項(xiàng)選擇題You are experiencing intermittent issues relating to congestion with your network.What are the possible causes of congestion on a LAN?()

A. A broadcast domain with too many hosts.
B. Full duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Network Segmentation.
F. Low bandwidth.


您可能感興趣的試卷

你可能感興趣的試題

3.多項(xiàng)選擇題

An administrator is configuring a Catalyst switch with VLAN information that must be automatically distributed to other Catalyst switches in the network.
What conditions must be met in order for the VLANs configured on this switch to be automatically configured on the other switches?()

A. The switch that will share its VLAN configuration must be in VTP server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be connected over VLAN trunks.
E. The switches must be configured to use the same STP version.
F. The switches must have VTP pruning activated.

4.單項(xiàng)選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. By default, all defined VLANs are allowed on the trunk.
B. Each single VLAN, or VLAN range, must be specified with the switchport mode command.
C. Each single VLAN, or VLAN range, must be specified with the vtp domain command.
D. Each single VLAN, or VLAN range, must be specified with the vlan database command.

5.多項(xiàng)選擇題Which of the following are benefits of VLANs?()

A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security,
D. The increase the size of broadcast domains while decreasing the number of the broadcast domains.
E. The increase the number of broadcast domains while decreasing the size of the broadcast domains.
F. They simplify switch administration.

最新試題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

題型:單項(xiàng)選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

題型:單項(xiàng)選擇題

Which of the following describe router functions?()

題型:多項(xiàng)選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:單項(xiàng)選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:單項(xiàng)選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項(xiàng)選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項(xiàng)選擇題