多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

题目
多选题
Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()
A

Spanning Tree Protocol

B

Shortest path first tree

C

Link-state advertisements (LSA)

D

Hold-down timers

E

Split horizon

F

VRP


相似考题
更多“Which of the following technologies can be used in distance”相关问题
  • 第1题:

    Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()

    • A、MPLS TE FR
    • B、MPLS VPN
    • C、BFD
    • D、RSVP
    • E、VPLS
    • F、SNMP

    正确答案:C

  • 第2题:

    A WORM drive can be equated to which of the following common technologies?()

    • A、 CDRW
    • B、 CDR
    • C、 Flash Media
    • D、 DVDRW

    正确答案:B

  • 第3题:

    Which of the following utilities can be used to list the routing table?()

    • A、ipconficj
    • B、nslookup
    • C、netstat
    • D、dig

    正确答案:C

  • 第4题:

    Which of the following Windows Server 2003 technologies can help with making backups of open files?()

    • A、Differential backup
    • B、Snapshot
    • C、VSS
    • D、Incremental backup

    正确答案:C

  • 第5题:

    Which of the following virtualization technologies can save time during provisioning?()

    • A、Cloning
    • B、Snapshots
    • C、Clustering
    • D、Virtual memory

    正确答案:A

  • 第6题:

    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

    • A、Intrusion detection
    • B、Virtualization
    • C、Kiting
    • D、Cloning

    正确答案:B

  • 第7题:

    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()

    • A、802.11a
    • B、802.11b
    • C、802.11g
    • D、802.11n

    正确答案:D

  • 第8题:

    A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2.  Which of the following virtualization technologies can be used?()

    • A、DLPAR
    • B、Micro-Partitioning
    • C、Virtual Storage
    • D、Virtual Ethernet

    正确答案:A

  • 第9题:

    多选题
    Which of the following technologies can be used to remotely gain access to a server console?()
    A

    PS/2 KVM

    B

    LDAP

    C

    VNC

    D

    Remote desktop

    E

    VPN


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following technologies can save server space and cooling requirements?()
    A

    Energy star ratings

    B

    Active solar panels

    C

    Network storage array

    D

    Blade servers


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()
    A

    Spanning Tree Protocol

    B

    Shortest path first tree

    C

    Link-state advertisements (LSA)

    D

    Hold-down timers

    E

    Split horizon

    F

    VRP


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    A basic cable tester can be used to do which of the following?()

    • A、Assure end to end continuity of a UTP cable.
    • B、Locate the distance to a cable break.
    • C、Determine the CAT level of a UTP cable.
    • D、Determine the distance to the nearest wiring closet.

    正确答案:A

  • 第13题:

    Which of the following technologies can be used to remotely gain access to a server console?()

    • A、PS/2 KVM
    • B、LDAP
    • C、VNC
    • D、Remote desktop
    • E、VPN

    正确答案:C,D

  • 第14题:

    Which of the following are storage technologies that can be hot swappable?()

    • A、SCSI
    • B、SAS
    • C、ATA
    • D、IDE
    • E、CMOS

    正确答案:A,B

  • 第15题:

    Which of the following tools can be used to identify the location of a network outage?()

    • A、traceroute
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第16题:

    Which of the following technologies is used on the backbone of an ISDN?()

    • A、VDSL
    • B、SDSL
    • C、OC3
    • D、ATM

    正确答案:D

  • 第17题:

    Which of the following technologies can detect and fix single bit memory errors?()

    • A、RAID
    • B、Registered memory
    • C、SDRAM
    • D、ECC

    正确答案:D

  • 第18题:

    which one of the following accurately describes field names?()

    • A、they must be unique in a database  
    • B、they can only be used once in a view  
    • C、they can only used once on each form  
    • D、they can be used mulriple times on a form 

    正确答案:C

  • 第19题:

    单选题
    Which of the following Windows Server 2003 technologies can help with making backups of open files?()
    A

     Differential backup

    B

     Snapshot

    C

     VSS

    D

     Incremental backup


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()
    A

    MPLS TE FR

    B

    MPLS VPN

    C

    BFD

    D

    RSVP

    E

    VPLS

    F

    SNMP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    A WORM drive can be equated to which of the following common technologies?()
    A

     CDRW

    B

     CDR

    C

     Flash Media

    D

     DVDRW


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following are storage technologies that can be hot swappable?()
    A

    SCSI

    B

    SAS

    C

    ATA

    D

    IDE

    E

    CMOS


    正确答案: C,B
    解析: 暂无解析