|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
Which two statements about a service set identifier (SSID) are true:all wireless devices on the same WLAN must have the same SSID;tells a wireless device to which WLAN it belongsWhich two statements about the relationship between LANs and WANs are true: WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals;WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved:Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.*Destination IP addresses in a packet header remain constant along the entire path to a target host. Which two statements are true of the deterministic access method: The throughput is predictable.;Devices take turns transmitting. Which two statements are true regarding the user EXEC mode: This is the default mode on an unconfigured router when first powered up; Only some aspects of the router configuration can be viewed. Which two statements characterize wireless network security:Using the default IP address on an access point makes hacking easier;With SSID broadcast disabled, an attacker must know the SSID to connect. Which two statements correctly define types of network infrastructure: A WLAN is designed to wirelessly interconnect users and end points in a small geographical area; A SAN is designed to support data storage, retrieval, and replication Which two statements correctly describe a router memory type and its contents: ROM is nonvolatile and contains basic diagnostic software.RAM is volatile and stores the IP routing table. Which two statements describe broadcast transmissions on a wired network: Directed broadcasts are intended for all hosts on a local or remote network; Limited broadcasts are only intended for the hosts on a local network Which two statements describe features or functions of the logical link control sublayer in Ethernet standards:Logical link control is implemented in software.*The data link layer uses LLC to communicate with the upper layers of the protocol suite. Which two tasks are the responsibility of the local DNS server: mapping name-to-IP addresses for internal hosts; forwarding name resolution requests between servers Which two things can be determined by using the ping command:the average time it takes a packet to reach the destination and for the response to return to the source*whether or not the destination device is reachable through the network Which two types of device are typically assigned with static IP addresses: web servers; printers Which type of IPv6 address is not routable and used only for communication on a single subnet: link-local address Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run: Trojan Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.) |