Encryption
Bandwidth limits
Minimal signal loss
No EMI
第1题:
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
第2题:
A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()
第3题:
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
第4题:
With regard to Ethernet media access methods, which of the following are true?()
第5题:
You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()
第6题:
You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()
第7题:
It resembles a Layer 2 bridge.
Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
Inline interfaces which have no IP addresses cannot be detected.
Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
第8题:
Broadband personal comm. Service (PCS)
Broadband circuit
Infrared
Spread spectrum
Cable
第9题:
It provides multiprotocol support.
It allows you to create separate networks on the VSAN.
It allows you to migrate to new technologies without a complete equipment upgrade.
It reduces cost and complexity by providing an easy transition to evolving technologies.
第10题:
Executable
Trojan
Virus
Worm
第11题:
Network management
Network optimization
Network security
Content storage networking
第12题:
Encryption
Bandwidth limits
Minimal signal loss
No EMI
第13题:
You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()
第14题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第15题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第16题:
As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)
第17题:
You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()
第18题:
You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share. What should you do?()
第19题:
A device waits for an electronic signal before transmitting.
A device listens and waits until the media is not busy before transmitting.
All devices on an Ethernet segment see data that passes on the network medium.
Only the sender and the receiver devices see data that passes on the network medium.
Ethernet networks allow you to configured devises with higher transmission priority.
第20题:
PPP
UDP
TCP
ICMP
第21题:
“Did you log in with an administrator account?”
“Have you been to any inappropriate websites?”
“What have you changed since the optical drive worked properly?”
“What has changed since the optical drive worked properly?”
第22题:
VPN
SCSI over IP
Remote Direct Memory Access
InfiniBand
第23题:
An increased need for specialized IT silos
Protecting the business from information outages
IT systems grow fast
Optimizing the efficiency with which IT operates
第24题:
Encryption
Minimal signal loss
Bandwidth limits
No EMI