多項(xiàng)選擇題What functions do routers perform in a network?()

A. Packet Switching
B. Access Layer Security
C. Path Selection.
D. VLAN Membership Assignment.
E. Bridging between LAN segments.
F. Micro-segmentation of Broadcast Domains.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by default?()

A.ROM
B.RAM
C.Flash
D.Bootstrap
E.Startup-.config

2.多項(xiàng)選擇題When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()

A. The type of application used on the network
B. The type of system bus used by the computers
C. The type of memory installed in each computer
D. The type of media used in the network topology
E. The type of protocols used in the network
F. The physical layout of the network hosts

3.多項(xiàng)選擇題On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

A. Source Quench.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Through.

4.多項(xiàng)選擇題After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()

A. It is a globally unique IP address.
B. It is a globally unique 48 bit address
C. It is provided by the manufacturer of the NIC.
D. It is used as part of the IPX/SPX configuration.
E. It is a logical address.

5.多項(xiàng)選擇題Which of the following correctly describe the various functions and virtues of a router?()

A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication

最新試題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項(xiàng)選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項(xiàng)選擇題

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()

題型:多項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項(xiàng)選擇題

A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()

題型:單項(xiàng)選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項(xiàng)選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項(xiàng)選擇題

Which of the following describe router functions?()

題型:多項(xiàng)選擇題

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

題型:多項(xiàng)選擇題