A.NCP
B.HDLC
C.LAPB
D.LAPD
您可能感興趣的試卷
你可能感興趣的試題
A. To ma a known IP address to a MAC address
B. To map a known DLCI to a MAC address
C. To ma a known MAC address to an IP address
D. To ma a known DLCI address to a IP address
E. To ma a known IP address to a SPID address
F. To ma a known SPID address to a MAC address
A. T1
B. Frame Relay
C. DSL
D. PPP
E. ISDN
F. IPX
A. IP address
B. encapsulation PPP
C. no shutdown
D. PPP authentication CHAP
E. Speed
F. None of the above
A. Needs to use Inverse ARP.
B. Maps a single IP subnet per DLCI.
C. Maps a single IP subnet across multiple DLCIs.
D. Resolves NBMA (non broadcast multi access) split horizon issues.
E. Requires use of the frame-relay map command.
F. None of the above
A. point-to-point
B. broadcast multi-access
C. nonbroadcast multipoint
D. nonbroadcast multi-access
E. broadcast point-to-multipoint
最新試題
Which of the following describe router functions?()
Which of the following statements regarding routed and routing protocols are true?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
Which characteristics are representative of a link-state routing protocol?()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()