單項(xiàng)選擇題Acknowldgement, Sequencing, and Flow control are characteristics of which OSI layer?()

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?()

A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.

2.單項(xiàng)選擇題What is valid reason for a switch to deny port access to new devices when port security is enabled?()

A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.

3.單項(xiàng)選擇題What is the purpose using the traceroute command?()

A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.

4.單項(xiàng)選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

5.單項(xiàng)選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

最新試題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:?jiǎn)雾?xiàng)選擇題

What is the default administrative distance of OSPF?()

題型:?jiǎn)雾?xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

On which options are standard access list based?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題