更多“Which of the following uses a ring topology?()”相关问题
  • 第1题:

    单选题
    Which of the following is the purpose of QoS?()
    A

    Load balance traffic across multiple LAN and WAN links.

    B

    Increase speed of network traffic.

    C

    Classify, mark, and prioritize traffic on WAN and LAN links

    D

    Guarantee traffic delivery.


    正确答案: B
    解析: 暂无解析

  • 第2题:

    单选题
    Which of the following represents the physical address of a network access card?()
    A

    FF01:D2:C4:87::11

    B

    00-30-48-83-9B-C8

    C

    08-9D-35-22-L2-34-FF-21

    D

    2D1A:C3:0:1C3B:2AD://FF://FEBE://9D3A


    正确答案: A
    解析: 暂无解析

  • 第3题:

    单选题
    Which of the following protocols is commonly used for VoIP technology?()
    A

    Telnet

    B

    SMTP

    C

    SIP

    D

    SNMP


    正确答案: C
    解析: 暂无解析

  • 第4题:

    单选题
    A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()
    A

    Configure traffic shaping to reduce the bandwidth available to the file sharing application.

    B

    Configure a separate VLAN for the IP phones.

    C

    Install a content caching proxy at the branch to reduce inbound WAN traffic.

    D

    Upgrade switches to provide higher bandwidth ports for workstations and IP phones.


    正确答案: C
    解析: 暂无解析

  • 第5题:

    单选题
    Which of the following is the BEST network device to allow multiple network connections to beterminated in one spot?()
    A

    A patch panel

    B

    A 66 block

    C

    A smart jack

    D

    A cross connect


    正确答案: D
    解析: 暂无解析

  • 第6题:

    单选题
    Which of the following technologies was designed to provide the FASTEST data rates over analog phone lines?()
    A

    RADSL

    B

    SONET

    C

    ADSL

    D

    MPLS


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    A technician needs to install additional access points for a new high speed connection being added in the new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable connections?()
    A

    Smart Jack

    B

    Demarc

    C

    110 Block

    D

    66 Block


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?()
    A

    Ipconfig

    B

    Nslookup

    C

    Netstat

    D

    Nbtstat


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following WAN protocols is a circuit switching technology?()
    A

    ISDN

    B

    SONET

    C

    Frame Relay

    D

    ATM


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()
    A

    Trunking

    B

    LAN

    C

    VPN

    D

    Peer to peer


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()
    A

    Multicast

    B

    Unicast

    C

    Broadcast

    D

    Peer-to-peer


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
    A

    Secure VPN

    B

    MAC filtering

    C

    IP filtering

    D

    Static IP addresses


    正确答案: C
    解析: 暂无解析

  • 第13题:

    多选题
    Which of the following network topologies BEST describes a VPN? ()(Select TWO)
    A

    Point to Point

    B

    Point to Multipoint

    C

    VLAN

    D

    Ring

    E

    Bus


    正确答案: A,D
    解析: 暂无解析

  • 第14题:

    单选题
    Which of the following can be an STP cable?()
    A

    RG-6

    B

    CAT5e

    C

    Fiber

    D

    RG-59


    正确答案: A
    解析: 暂无解析

  • 第15题:

    单选题
    An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()
    A

    FTP

    B

    SNMPv2

    C

    TFTP

    D

    KTTPS


    正确答案: D
    解析: 暂无解析

  • 第16题:

    单选题
    Which of the following is used to create multiple networks from one large network?()
    A

    PAT

    B

    NAT

    C

    Multicast

    D

    Subnetting


    正确答案: C
    解析: 暂无解析

  • 第17题:

    单选题
    Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
    A

    Network management

    B

    Protocol analyzer

    C

    Network monitoring

    D

    System diagnostic


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()
    A

    ST

    B

    RJ-11

    C

    RJ-45

    D

    MT-RJ


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    A server keeps rebooting at various times throughout the day. Which of the following tools wouldBEST help to diagnose this issue?()
    A

    Multimeter

    B

    Temperature monitor

    C

    Cable tester

    D

    Toner probe


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following should be configured to provide priority to voice traffic?()
    A

    Port mirroring

    B

    DMZ

    C

    Qos

    D

    Trunking


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Data encryption and decryption occurs at which layer of the OSI model?()
    A

    Transport

    B

    Presentation

    C

    Session

    D

    Application


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
    A

    Ashort

    B

    Open pairs

    C

    ESD

    D

    EMI


    正确答案: C
    解析: 暂无解析