Point to Point
Point to Multipoint
VLAN
Ring
Bus
第1题:
A. Point to Point
B. Point to Multipoint
C. VLAN
D. Ring
E. Bus
第2题:
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()
第3题:
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
第4题:
Which of the following network topologies BEST describes a VPN? ()(Select TWO)
第5题:
Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)
第6题:
Which of the following BEST describes RAID 0?()
第7题:
A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()
第8题:
An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
第9题:
Disable all 802.11 traffic
Disable the SSID from broadcasting
Disable WPA
Enable Bluetooth only communication
Change the default admin password
Disable WEP
第10题:
VLAN
Peer to Peer
VTP
VPN
第11题:
TACACS+
RADIUS
Kerberos
802.1X
RRAS
第12题:
An outline for future research
An expanded definition of commonly misunderstood terms
An analysis of a dispute between two theories
A discussion of research findings in an ongoing inquiry
第13题:
A.RDP
B.VNC
C.SSL
D.PPTP
E.RAS
第14题:
Which of the following BEST describes a hub?()
第15题:
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
第16题:
Which of the following network appliances can BEST be described as allowing multiple servers toshare requests for a website through the same public IP address?()
第17题:
Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()
第18题:
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
第19题:
Which of the following are common VPN transports? (Select TWO)()
第20题:
Load balancing
Caching engines
Qos
Fault tolerance systems
Traffic shaping
第21题:
RDP
VNC
SSL
PPTP
RAS
第22题:
Point to Point
Point to Multipoint
VLAN
Ring
Bus
第23题:
21
25
80
110
123
第24题:
IPSec
IPSec with GRE
DMVPN
EZVPN
all of the choices