题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-26 21:54:17

[单项选择]In a switched LAN network, what is the Spanning-Tree algorithm used for?()
A. It is used to provide a mechanism for routing updates in switched environments.
B. It is used to prevent routing loops in networks with redundant routes.
C. It is used to prevent switching loops in networks with redundant switched routes.
D. It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.
E. It is used to segment a network into multiple collision domains.
F. None of the above.
G. All of the above are functions of STP.

更多"In a switched LAN network, what is "的相关试题:

[单项选择] You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
[单项选择]When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()
A. when all switches have the same BID as the root switch
B. when all switches have received the MAC address of each neighboring switch
C. when every enabled switch port has been assigned a unique identifier
D. when every operating switch port is in either the blocking or forwarding state
E. when all switches are in either client, server, or transparent mode
[单项选择]A packet-switched network, files and E-mail messages are broken down into small pieces, called( ).
A. messages
B. pieces
C. packets
D. circuits
[单项选择]In a switched environment, what does the IEEE 802.1Q standard describe?()
A. the operation of VTP
B. a method of VLAN trunking
C. an approach to wireless LAN communication
D. the process for root bridge selection
E. VLAN pruning vlan
[单项选择]What is a Label-Switched Path?()
A. a traffic engineered path
B. another name for a Frame Relay PVC
C. a bidirectional path through a network
D. a unidirectional path through a network
[单项选择]In a Bridged 1483 network, what Layer 2 encapsulations are passed between the DSL bridge and the ERX?()
A. single ATM header
B. single Ethernet header
C. ATM header followed by a PPP header
D. ATM header followed by an Ethernet header
[多项选择]In an Ethernet network, under what two scenarios can devices transmit? ()
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access
[名词解释]LAN
[单项选择]What type of network connection is recommended for HMC and POWER6 Service Processor communication?()
A. Open
B. Public
C. Private
D. Virtual
[多项选择]What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。
A. VLAN support
B. compression
C. authentication
D. sliding windows
E. multilink support
F. quality of service
[多项选择]What are three factors a network administrator must consider before implementing Netflow in the network?()
A. CPU utilization
B. where Netflow data will be sent
C. number of devices exporting Netflow data
D. port availability
E. SNMP version
F. WAN encapsulation
[多项选择]What are two reasons a network administrator would use CDP (Choose two.)()。
A. to verify the type of cable interconnecting two devices
B. to determine the status of network services on a remote device
C. to obtain VLAN information from directly connected switches
D. to verify Layer 2 connectivity between two devices when Layer 3 fails
E. to obtain the IP address of a connected device in order to telnet to the device
F. to determine the status of the routing protocols between directly connected routers
[多项选择]What are two reasons that a network administrator would use access lists (Choose two.)()。
A. to control vty access into a router
B. to control broadcast traffic through a router
C. to filter traffic as it passes through a router
D. to filter traffic that originates from the router
E. to replace passwords as a line of defense against security incursions
[单项选择]What is the goal of the borderless network architecture?()
A. to provide users with A single device that permits access to information anywhere
B. to provide users with the same productivity and access to information no matter where are or which device they use
C. to eliminate the need for border security and firewalls
D. to provide companies with A way to extend their security and control over employees on the internet

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码