АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

What statement illustrates a drawback of the CSMA/CD access method:Collisions can decrease network performance

Читайте также:
  1. A computer that is configured with the IPv6 address as shown in the exhibit is unable to access the internet. What is the problem?
  2. A message is sent to all hosts on a remote network. Which type of message is it:directed broadcast
  3. Access Control List
  4. Access-list 10 permit any
  5. ACCOUNTING AND FINANCIAL STATEMENTS
  6. AD CONSILIUM NE ACCESSERIS, ANTEQUAM VOCERIS - на совет не иди, пока не позовут (Цицерон)
  7. Advantages and Disadvantages of Wireless Networking.
  8. Are the following statements true or false?
  9. Are these statements true or false?
  10. Cash Flow statement
  11. CHAPTER 8. GIVING INFORMATION (STATEMENTS)
  12. COMPUTER NETWORKS

What step in a TCP session does this capture represent : session termination

What three functions are defined by network protocols to allow communication between known source and destination IP addresses: data encoding, message size, delivery options

What two IPv6 prefixes are valid when nibble aligned subnet masks are used: / 64;/68

What two preconfigured settings that affect security are found on most new wireless routers: default administrator password;broadcast SSID

What two statements describe characteristics of Layer 3 broadcasts:Routers create broadcast domains.*A limited broadcast packet has a destination IP address of 255.255.255.255.

What type of address is 01-00-5E-0A-00-02: an address that reaches a specific group of hosts

What type of delivery uses data link layer addresses: local delivery

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table: It forwards the frame out of all ports except for the port at which the frame was received.

What will a network administrator use to modify a configuration on a Cisco router: IOS

What will happen if the default gateway address is incorrectly configured on a host: The host cannot communicate with hosts in other networks.

When a Cisco router is being moved from an IPv4 network to a complete IPv6 environment, which series of commands would correctly enable IPv6 forwarding and interface addressingRouter# configure terminal;Router(config)# interface fastethernet 0/0;Router(config-if)# ipv6 address 2001:db8:bced:1::9/64;Router(config-if)# no shutdown;Router(config-if)# exit;Router(config)# ipv6 unicast-routing

When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response: the original source port number that was randomly generated by the client

When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message:solicited-node multicast address

When applied to a router, which command would help mitigate brute-force password attacks against the router: login block-for 60 attempts 5 within 60

When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group:hosts accessible from the Internet

When is a wired connection preferred to a wireless connection by an end-user device: when the end-user device will run an application that requires a dedicated connection to the network

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business: IMAP


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)