單項選擇題Which frame field do error detection schemes view to perform their function?()

A. ERR
B. Flag
C. FCS
D. MTU
E. MAC
F. PDU


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of one the following fields is contained within an IEEE Ethernet frame header?()

A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address

3.多項選擇題What functions do routers perform in a network?()

A. Packet Switching
B. Access Layer Security
C. Path Selection.
D. VLAN Membership Assignment.
E. Bridging between LAN segments.
F. Micro-segmentation of Broadcast Domains.

4.單項選擇題If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by default?()

A.ROM
B.RAM
C.Flash
D.Bootstrap
E.Startup-.config

5.多項選擇題When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()

A. The type of application used on the network
B. The type of system bus used by the computers
C. The type of memory installed in each computer
D. The type of media used in the network topology
E. The type of protocols used in the network
F. The physical layout of the network hosts

最新試題

Which of the following describe router functions?()

題型:多項選擇題

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

題型:單項選擇題

Which of the following if addresses can be assigned to host devices?()

題型:多項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:單項選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項選擇題

Which characteristics are representative of a link-state routing protocol?()

題型:多項選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項選擇題

Which command is used to display the placement and direction of an IP access control list on a router?()

題型:單項選擇題