网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()
A
Star
B
Bus
C
Mesh
D
Ring
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A StarB BusC MeshD Ring” 相关考题
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
A. StarB. HybridC. MeshD. Ring
考题
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()
A.MeshB.BusC.RingD.Star
考题
Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()
A.StarB.BusC.MeshD.Ring
考题
Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()
A.StarB.RingC.BusD.Mesh
考题
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A. no single point of failureB. determine which protocol to useC. trading database server locationD. deterministic response to all failures
考题
Which of the following network topologies offers the greatest protection against network outages due to a single line break?()A、BusB、StarC、MeshD、Ring
考题
Both bus and tree topologies are characterized by the use of multipoint (1).For the bus, all stations attach, through appropriate hardware (2) known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the(3). A transmission from any station propagates the length of the medium in both directions and can be received by all other (4). At each end of the bus is a (5) , which absorbs any signal, removing it from the bus.
空白(3)处应选择()A、treeB、busC、starD、ring
考题
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A、MeshB、BusC、RingD、Star
考题
Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()A、StarB、RingC、BusD、Mesh
考题
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A、no single point of failureB、determine which protocol to useC、trading database server locationD、deterministic response to all failures
考题
Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus
考题
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()A、MeshB、Point to pointC、Point to multipointD、Ring
考题
In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
考题
A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.
考题
Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring
考题
Company.com has installed and configured a VIO server utilizing a Shared Ethernet Adapter and is investigating some network performance issues visible on the clients. The customer wants to understand the total network connectivity from the clients out to the data center routers. Which of the following commands will identify the Shared Ethernet Adapter mapping?()A、ifconfig -aB、netstat -nrC、lsmap -all -netD、lsdev -Cc adapter
考题
单选题Company.com has installed and configured a VIO server utilizing a Shared Ethernet Adapter and is investigating some network performance issues visible on the clients. The customer wants to understand the total network connectivity from the clients out to the data center routers. Which of the following commands will identify the Shared Ethernet Adapter mapping?()A
ifconfig -aB
netstat -nrC
lsmap -all -netD
lsdev -Cc adapter
考题
单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A
NIC filtering is enabled.B
Port security is configured.C
NIC is not in promiscuous mode.D
NIC is in promiscuous mode.
考题
单选题Which of the following network topologies offers the greatest protection against network outages due to a single line break?()A
BusB
StarC
MeshD
Ring
考题
单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A
CDPB
SNMPC
DHCPD
ARPE
DNSF
None of the above
考题
单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A
NIC filtering is enabled.B
Port security is configured.C
NIC is not in promiscuous mode.D
NIC is in promiscuous mode.
考题
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A
VLANB
Peer to PeerC
VTPD
VPN
考题
多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus
考题
单选题In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A
MeshB
Token ringC
StarD
Spanning tree
考题
单选题Which of the following connectivity issues is likely to occur within a token ring network?()A
CrosstalkB
Broadcast stormC
Duplex mismatchD
Collision
考题
单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A
MeshB
BusC
RingD
Star
热门标签
最新试卷