A. defines how the media is accessed
B. supplies a token to determine which host has access to the media
C. defines the encoding of electrical signals on the wire
D. determines the preamble bits
您可能感興趣的試卷
你可能感興趣的試題
A. path cost
B. lowest port MAC address
C. VTP revision number
D. highest port priority number
E. port priority number and MAC address
A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point network
B. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router
C. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access network
D. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers
A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief
A. A configured router prompts for a password
B. A configured router goes to the privileged mode prompt
C. An un configured router goes into the setup dialog
D. An un configured router goes to the enable mode prompt
A. when all switches have the same BID as the root switch
B. when all switches have received the MAC address of each neighboring switch
C. when every enabled switch port has been assigned a unique identifier
D. when every operating switch port is in either the blocking or forwarding state
E. when all switches are in either client, server, or transparent mode
最新試題
Which of the following if addresses can be assigned to host devices?()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Which connections allow the use of full-duplex Ethernet?()
Which of the following statements regarding routed and routing protocols are true?()
Which of the following contribute to congestion on an Ethernet network?()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()