A.blocking
B.learning
C.disabled
D.forwarding
E.listening
您可能感興趣的試卷
你可能感興趣的試題
A. Security increases because only the network administrator may change the routing tables.
B. Configuration complexity decreases as network size increases.
C. Routing updates are automatically sent to neighbors.
D. Route summarization iscompued automatically by the router.
E. Routing traffic load is reduced when used in stub network links
F. An efficient algorithm is used to build routing tables,using automatic updates.
G. Routing tables adapt automatically to topology changes.
A. to confine network instability to single areas of the network.
B. to reduce the complexity of router configuration
C. to speed up convergence
D. to lower costs by replacing routers with distribution layer switches
E. to decrease latency by increasing bandwidth
F. to reduce routing overhead
A.complicated header
B.plug-and-play
C.no broadcasts
D.checksums
E.optional IPsec
F.autoconfiguration
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.
A. RSTP significantly reduces topology reconverging time after a link failure.
B. RSTP expends the STP port roles by adding the alternate and backup roles.
C. RSTP port atates are blocking,discarding,learing,or forwarding.
D. RSTP also uses the STP proprsal-agreement sequence.
E. RSTP use the same timer-baseed process as STP on point-to-point links.
F. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.
A. NAT protects network security because private networks are not advertised.
B. NAT accelerates the routing process because no modifications are made on the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require extemal access.
F. NAT conserves addresses through host MAC-level multiplexing.
A. SW1#show swithport port-security interface FastEthernet 0/12
B. SW1# show swithport port-secure interface FastEthernet 0/12
C. SW1# show port-secure interface FastEthernet 0/12
D. SW1#show running-config
E. SW1#show port-security interface FastEthernet 0/12
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access
A. Create an additional ACL to block the access to VLAN 1.
B. Move the management VLAN to something other than default.
C. Move all ports to another VLAN and deactivate the default VLAN.
D. Limit the access in the switch using port security configuration.
E. Use static VLAN in trunks and access ports to restrict connections.
F. Shutdown all unused ports in the Catalyst switch.
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
最新試題
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
At which layer of the OSI model dose PPP perform?()
Which IPsec security protocol should be used when confidentiality is required?()
How are VTP advertisements delivered to switches across the network?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
At which layer of the OSI model is RSTP used to prevent loops?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Which pairing reflects a correct protocol-and-metric relationship?()