АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

Which two statements about a service set identifier (SSID) are true:all wireless devices on the same WLAN must have the same SSID;tells a wireless device to which WLAN it belongs

Читайте также:
  1. A 16-bit wide flash memory device is used to store the FPGA configuration data. Because each
  2. A Brief Introduction to Wireless Technology.
  3. A message is sent to all hosts on a remote network. Which type of message is it:directed broadcast
  4. A Which sentence (1-3) best describes what it’s about?
  5. ABOUT CHANNELING
  6. About or staff.
  7. ABOUT THE AUTHOR
  8. ABOUT THE EARTH
  9. ACCOUNTING AND FINANCIAL STATEMENTS
  10. Advantages and Disadvantages of Wireless Networking.
  11. Aeronautical Information Services (AIS)
  12. All wireless devices on the same WLAN must have the same SSID

Which two statements about the relationship between LANs and WANs are true: WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals;WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.
Which three network tools provide the minimum required security protection for home users: antivirus software,antispyware software,a firewall
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources: wireless LAN
Which expression accurately defines the term congestion: a state where the demand on the network resources exceeds the available capacity
Which two statements are correct about IPv4 and IPv6 addresses:IPv6 addresses are represented by hexadecimal numbers.*IPv4 addresses are 32 bits in length.

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved:Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.*Destination IP addresses in a packet header remain constant along the entire path to a target host.

Which two statements are true of the deterministic access method: The throughput is predictable.;Devices take turns transmitting.

Which two statements are true regarding the user EXEC mode: This is the default mode on an unconfigured router when first powered up; Only some aspects of the router configuration can be viewed.

Which two statements characterize wireless network security:Using the default IP address on an access point makes hacking easier;With SSID broadcast disabled, an attacker must know the SSID to connect.

Which two statements correctly define types of network infrastructure: A WLAN is designed to wirelessly interconnect users and end points in a small geographical area; A SAN is designed to support data storage, retrieval, and replication

Which two statements correctly describe a router memory type and its contents: ROM is nonvolatile and contains basic diagnostic software.RAM is volatile and stores the IP routing table.

Which two statements describe broadcast transmissions on a wired network: Directed broadcasts are intended for all hosts on a local or remote network; Limited broadcasts are only intended for the hosts on a local network

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards:Logical link control is implemented in software.*The data link layer uses LLC to communicate with the upper layers of the protocol suite.

Which two tasks are the responsibility of the local DNS server: mapping name-to-IP addresses for internal hosts; forwarding name resolution requests between servers

Which two things can be determined by using the ping command:the average time it takes a packet to reach the destination and for the response to return to the source*whether or not the destination device is reachable through the network

Which two types of device are typically assigned with static IP addresses: web servers; printers

Which type of IPv6 address is not routable and used only for communication on a single subnet: link-local address

Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run: Trojan


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)