|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
What statement illustrates a drawback of the CSMA/CD access method:Collisions can decrease network performanceWhat step in a TCP session does this capture represent : session termination What three functions are defined by network protocols to allow communication between known source and destination IP addresses: data encoding, message size, delivery options What two IPv6 prefixes are valid when nibble aligned subnet masks are used: / 64;/68 What two preconfigured settings that affect security are found on most new wireless routers: default administrator password;broadcast SSID What two statements describe characteristics of Layer 3 broadcasts:Routers create broadcast domains.*A limited broadcast packet has a destination IP address of 255.255.255.255. What type of address is 01-00-5E-0A-00-02: an address that reaches a specific group of hosts What type of delivery uses data link layer addresses: local delivery What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table: It forwards the frame out of all ports except for the port at which the frame was received. What will a network administrator use to modify a configuration on a Cisco router: IOS What will happen if the default gateway address is incorrectly configured on a host: The host cannot communicate with hosts in other networks. When a Cisco router is being moved from an IPv4 network to a complete IPv6 environment, which series of commands would correctly enable IPv6 forwarding and interface addressingRouter# configure terminal;Router(config)# interface fastethernet 0/0;Router(config-if)# ipv6 address 2001:db8:bced:1::9/64;Router(config-if)# no shutdown;Router(config-if)# exit;Router(config)# ipv6 unicast-routing When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response: the original source port number that was randomly generated by the client When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message:solicited-node multicast address When applied to a router, which command would help mitigate brute-force password attacks against the router: login block-for 60 attempts 5 within 60 When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group:hosts accessible from the Internet When is a wired connection preferred to a wireless connection by an end-user device: when the end-user device will run an application that requires a dedicated connection to the network When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business: IMAP Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.) |