网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is the purpose of the magic number in an LCP negotiation?()
A

It is used to detect loops.

B

It is an interface identifier.

C

It selects a compression algorithm.

D

It specifies the transmission media.


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is the purpose of the magic number in an LCP negotiation?()A It is used to detect loops.B It is an interface identifier.C It selects a compression algorithm.D It specifies the transmission media.” 相关考题
考题 What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?() A.policy listB.RADIUS VSAC.classifier ACLD.LCP negotiation

考题 What is the purpose of the magic number in an LCP negotiation?() A.It is used to detect loops.B.It is an interface identifier.C.It selects a compression algorithm.D.It specifies the transmission media.

考题 What statement is true?()A、Link Control Protocol(LCP) is used for basic PPP link setup and operationB、Link Control Protocol(LCP) is used for denying PPP connections to unauthorized devices.C、Link Control Protocol(LCP) for PPP is synonymous to ARP for Ethernet.D、None of the above

考题 What does the protocol field inside the PPP frame indicate?()A、the protocol used to determine the authentication methodB、the protocol used to identify the data in the Information fieldC、the protocol used to carry the PPP frameD、the protocol used to decode the FCS fieldE、the protocol used to detect the number of padding bytes

考题 What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetworkB、It is used to identify an IP address as either private or publicC、It is used to identify the network to which an IP address belongsD、It is used to identify the total number of bits present in an IP address

考题 What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A、policy listB、RADIUS VSAC、classifier ACLD、LCP negotiation

考题 What is the purpose of a chassis cluster?()A、Chassis clusters are used to aggregate routes.B、Chassis clusters are used to create aggregate interfaces.C、Chassis clusters are used to group two chassis into one logical chassis.D、Chassis clusters are used to group all interfaces into one cluster interface.

考题 In JUNOS software, what is the purpose of the eui-64 command?()A、Automatically create the IS-IS NET IDB、Dynamically create an MPLS router IDC、Automatically assign the host number of an IPv6 address.D、Dynamically assign a MAC address to an Ethernet interface.

考题 What is the purpose of the OSPF router ID in a OR/BOR election?()A、It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point networkB、It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF routerC、It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access networkD、It is used to determine which interfaces will send Hello packets to neighboring OSPF routers

考题 What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetwork.B、It is used to identify an IP address as either private or public.C、It is used to identify the network to which an IP address belongs.D、It is used to identify the total number of bits present in an IP address.

考题 What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A、profileB、policylistC、classifier ACLD、LCP negotiation

考题 What is the purpose of the magic number in an LCP negotiation?()A、It is used to detect loops.B、It is an interface identifier.C、It selects a compression algorithm.D、It specifies the transmission media.

考题 When sending an LCP Configuration Request,what can the ERX Edge Router possibly negotiate?()A、IP addressB、magic numberC、WINS assignmentD、Domain Name Server

考题 You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()A、The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

考题 单选题What is the purpose of a chassis cluster?()A Chassis clusters are used to aggregate routes.B Chassis clusters are used to create aggregate interfaces.C Chassis clusters are used to group two chassis into one logical chassis.D Chassis clusters are used to group all interfaces into one cluster interface.

考题 单选题In optical transmission systems, chirped lasers are used for the purpose of:().A Turning the laser to a specific ITU channelB Keeping the signal wavelength locked to a specific technologyC Suppressing FWM and SBS non-linear effectsD None ofthe above

考题 单选题Refer to the exhibit. What is the configuration an example of?()A enabling modular QoS over Frame RelayB enabling Real-Time Transport Protocol (RTP) header compressionC enabling distributed compressed Transmission Control ProtocolD enabling latency and jitter reduction for Transmission Control trafficE enabling TCP header compression

考题 单选题What is the purpose of a network mask?()A It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB It is used to define which parts of the IP address are allocated to host addresses and network prefixesC It is used to hide subnets from external networks by masking the subnets with NATD It is used to differentiate a network as a classful network or a classless network

考题 单选题What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A profileB policylistC classifier ACLD LCP negotiation

考题 单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A It defines which devices will be sending traps.B It specifies where to send traps.C It defines the IP addresses of management systems that can access the device.D It specifies which devices can be polled for SNMP data.

考题 单选题What is the purpose of a network mask?()A It is used to identify the maximum hop count of a subnetworkB It is used to identify an IP address as either private or publicC It is used to identify the network to which an IP address belongsD It is used to identify the total number of bits present in an IP address

考题 单选题In JUNOS software, what is the purpose of the eui-64 command?()A Automatically create the IS-IS NET IDB Dynamically create an MPLS router IDC Automatically assign the host number of an IPv6 address.D Dynamically assign a MAC address to an Ethernet interface.

考题 单选题What statement is true?()A Link Control Protocol(LCP) is used for basic PPP link setup and operationB Link Control Protocol(LCP) is used for denying PPP connections to unauthorized devices.C Link Control Protocol(LCP) for PPP is synonymous to ARP for Ethernet.D None of the above

考题 单选题What is the purpose of the magic number in an LCP negotiation?()A It is used to detect loops.B It is an interface identifier.C It selects a compression algorithm.D It specifies the transmission media.

考题 单选题What is the purpose of the OSPF router ID in a OR/BOR election?()A It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point networkB It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF routerC It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access networkD It is used to determine which interfaces will send Hello packets to neighboring OSPF routers

考题 单选题What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A policy listB RADIUS VSAC classifier ACLD LCP negotiation

考题 单选题What does the protocol field inside the PPP frame indicate?()A the protocol used to determine the authentication methodB the protocol used to identify the data in the Information fieldC the protocol used to carry the PPP frameD the protocol used to decode the FCS fieldE the protocol used to detect the number of padding bytes

考题 单选题You want to use RMAN to create compressed backups.  Which statement is true about the compression algorithms that RMAN can use?()A  The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B  The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C  The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D  Only the BZIP2 compression algorithm can be used to make compressed backups to disk.