A.%
B.@
C.>
D.$
E.#
您可能感興趣的試卷
你可能感興趣的試題
A.255.255.255.0
B.255.255.255.192
C.255.255.255.250
D.255.255.255.252
A.On router R2, configure a default static route to the 192.168.1.0 network.
B.On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.
C.On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.
D.On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
A.0
B.1
C.2
D.3
E.4
A.ip route 0.0.0.0 0.0.0.0 s0/0/0
B.ip route 0.0.0.0 0.0.0.0 209.165.200.226
C.ip route 209.165.200.0 255.255.255.0 192.168.1.250
D.ip route 192.168.1.0 255.255.255.0 209.165.100.250
A.using adapters and access points manufactured by the same company
B.overlapping the wireless cell coverage by at least 10%
C.configuring all access points to use the same channel
D.utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
A.AES-CCMP
B.PPK via IV
C.PSK
D.TKIP/MIC
A.transparent
B.auto
C.on
D.desirable
E.blocking
F.forwarding
A.Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link.
B.Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex Ethernet uses a jam signal.
C.Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth.
D.Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive.
A.copier
B.microwave oven
C.toaster
D.cordless phone
E.IP phone
F.AM radio
A.VTP
B.STP
C.ISL
D.802.1Q
E.VLSM
最新試題
Which IPsec security protocol should be used when confidentiality is required?()
Which command displays the CHAP authentication process as it occurs between two routers?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which statement is true, as relates to classful or classless routing?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()