单选题When one connection to a host fails in a full mesh network, which of the following is true?()A All hosts can communicate.B No hosts can communicate.C Half of the hosts will lose communication.D Only the two hosts between the failed connection will lose

题目
单选题
When one connection to a host fails in a full mesh network, which of the following is true?()
A

All hosts can communicate.

B

No hosts can communicate.

C

Half of the hosts will lose communication.

D

Only the two hosts between the failed connection will lose communication.


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题When one connection to a host fails in a full mesh network, which of the following is true?()A All hosts can communicate.B No hosts can communicate.C Half of the hosts will lose communication.D Only the two hosts between the failed connection will lose”相关问题
  • 第1题:

    Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts?()

    A.27.35.16.32

    B.27.35.16.33

    C.27.35.16.48

    D.27.35.16.47

    E.27.35.16.45

    F.27.35.16.44


    参考答案:B, E, F

  • 第2题:

    Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

    A.15.234.118.63

    B.92.11.178.93

    C.134.178.18.56

    D.192.168.16.87

    E.201.45.116.159

    F.217.63.12.192


    参考答案:B, C, D

  • 第3题:

    The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems (Choose two.)()。

    A.Configure the gateway on Host A as 10.1.1.1

    B.Configure the gateway on Host B as 10.1.2.254

    C.Configure the IP address of Host A as 10.1.2.2

    D.Configure the IP address of Host B as 10.1.2.2

    E.Configure the masks on both hosts to be 255.255.255.224

    F.Configure the masks on both hosts to be 255.255.255.240


    参考答案:B, D

  • 第4题:

    When one connection to a host fails in a full mesh network, which of the following is true?()

    • A、All hosts can communicate.
    • B、No hosts can communicate.
    • C、Half of the hosts will lose communication.
    • D、Only the two hosts between the failed connection will lose communication.

    正确答案:A

  • 第5题:

    Which of the following are true of Ethernet technology?()

    • A、Hosts use a logical ring topology.
    • B、Hosts use a logical bus topology
    • C、Hosts must wait for an electronic signal to transfer data.
    • D、Hosts are directly connected to a wiring concentrator called a MSAU.

    正确答案:B

  • 第6题:

    Which of the following statements concerning IGMP are correct?(Choose all that apply.)()

    • A、With IGMPvl, queries are sent to a specific group
    • B、Hosts issuing IGMPvl requests will be correctly interpreted by IGMPv2 hosts due to backwardcompatibility
    • C、An IGMPv2 router will ignore IGMPv2 leave messages when IGMFVl hosts are present
    • D、With IGMFV2, a leave message is supported
    • E、An IGMPv2 host will send an IGMFVl report on an IGMFVl router
    • F、An IGMPv2 router can only allow IGMPv2 hosts to execute a join request

    正确答案:C,D,E

  • 第7题:

    A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()

    • A、Micro segmentation
    • B、Transparent switching
    • C、peer-to-peer networking
    • D、port security
    • E、store-and-forward switching
    • F、virtual local area networks

    正确答案:A

  • 第8题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    • A、IP addresses can be managed from a central point
    • B、Computers can automatically get new addressing when moved to a different network segment
    • C、Media Access Control addresses can be changed automatically
    • D、The network speed can automatically adjust based on the type of traffic being generated
    • E、The HOSTS file on the computer can be validated for proper entries

    正确答案:A,B

  • 第9题:

    Which files can be used together to allow remote command execution on a server?()  

    • A、/etc/.rhosts and $HOME/hosts.equiv
    • B、/etc/hosts.equiv and $HOME/.rhosts
    • C、/etc/rhosts.equiv and $HOST/.rhosts
    • D、/etc/hosts.equiv and $HOME/.hosts.equiv

    正确答案:B

  • 第10题:

    单选题
    A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()
    A

    Micro segmentation

    B

    Transparent switching

    C

    peer-to-peer networking

    D

    port security

    E

    store-and-forward switching

    F

    virtual local area networks


    正确答案: F
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following commands verifies connectivity between two hosts?()
    A

     chkntfs

    B

     dxdiag

    C

     tracert

    D

     ipconfig

    E

     ping


    正确答案: E,C
    解析: 暂无解析

  • 第12题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet.What would your reply be?()

    A. One network with 254 hosts.

    B. 254 networks with 254 hosts per network.

    C. 65,534 networks with 255 hosts per network.

    D. 30 networks with 64 hosts per network.

    E. 254 networks with 65,534 per network.


    参考答案:A

  • 第14题:

    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()

    A.The subnet mask in use is 255.255.255.192.

    B.The subnet mask in use is 255.255.255.128.

    C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1

    D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1

    E.The LAN interface of the router is configured with one IP address.

    F.The LAN interface of the router is configured with multiple IP addresses.


    参考答案:B, C, F

  • 第15题:

    Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? ()

    • A、IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not provide a similar capability for hosts.
    • B、IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
    • C、Hosts can be  configured to receive both IPv4 and IPv6 addresses via DHCP.
    • D、Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned only.
    • E、IPv4 and IPv6 addresses c an be simultaneously assigned to a host but not to a router interface.

    正确答案:A,C

  • 第16题:

    Which of the following are the BEST tools to test connectivity between two hosts?()

    • A、netstat
    • B、nslookup
    • C、ipconfig
    • D、traceroute
    • E、pathping

    正确答案:D,E

  • 第17题:

    Which of the following can lead to the contribution of LAN traffic congestion?()

    • A、Too many hosts in a broadcast domain
    • B、Full duplex operation
    • C、Broadcast storms
    • D、Multicasting
    • E、Segmentation
    • F、Low bandwidth

    正确答案:A,C,D,F

  • 第18题:

    You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()

    • A、There are 254 usable subnets.
    • B、There are 256 usable hosts per subnet.
    • C、There are 50 usable subnets.
    • D、There are 254 usable hosts per subnet.
    • E、There are 24 usable hosts per subnet.
    • F、There is one usable network.

    正确答案:A,D

  • 第19题:

    Which of the following commands verifies connectivity between two hosts?()

    • A、chkntfs
    • B、dxdiag
    • C、tracert
    • D、ipconfig
    • E、ping

    正确答案:C,E

  • 第20题:

    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()

    • A、It is a list of remote database links stored in the XML file that are available to the users of the database.
    • B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    • C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    • D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    正确答案:B

  • 第21题:

    多选题
    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()
    A

    The subnet mask in use is 255.255.255.192.

    B

    The subnet mask in use is 255.255.255.128.

    C

    The IP address 172.16.1.25 can be assigned to hosts in VLAN1

    D

    The IP address 172.16.1.205 can be assigned to hosts in VLAN1

    E

    The LAN interface of the router is configured with one IP address.

    F

    The LAN interface of the router is configured with multiple IP addresses.


    正确答案: C,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following statements concerning IGMP are correct?(Choose all that apply.)()
    A

    With IGMPvl, queries are sent to a specific group

    B

    Hosts issuing IGMPvl requests will be correctly interpreted by IGMPv2 hosts due to backwardcompatibility

    C

    An IGMPv2 router will ignore IGMPv2 leave messages when IGMFVl hosts are present

    D

    With IGMFV2, a leave message is supported

    E

    An IGMPv2 host will send an IGMFVl report on an IGMFVl router

    F

    An IGMPv2 router can only allow IGMPv2 hosts to execute a join request


    正确答案: C,D,E
    解析: 暂无解析

  • 第23题:

    单选题
    When one connection to a host fails in a full mesh network, which of the following is true?()
    A

    All hosts can communicate.

    B

    No hosts can communicate.

    C

    Half of the hosts will lose communication.

    D

    Only the two hosts between the failed connection will lose communication.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which files can be used together to allow remote command execution on a server?()
    A

    /etc/.rhosts and $HOME/hosts.equiv

    B

    /etc/hosts.equiv and $HOME/.rhosts

    C

    /etc/rhosts.equiv and $HOST/.rhosts

    D

    /etc/hosts.equiv and $HOME/.hosts.equiv


    正确答案: C
    解析: 暂无解析