网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()
A
VLAN support
B
compression
C
authentication
D
sliding windows
E
multilink support
F
quality of service
参考答案
参考解析
解析:
暂无解析
更多 “多选题What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()AVLAN supportBcompressionCauthenticationDsliding windowsEmultilink supportFquality of service” 相关考题
考题
●LANs can be connected by using bridges,which operate in the (67) .(67) A.data-link layerB.Physical layerC.network layerD.transport layer
考题
LANs can be connected by using bridges, which operate in theA.physical layerB.data link layerC.network layerD.transport layer
考题
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)A. Routers generally cost less than switchesB. Filtering can occur based on Layer 3 informationC. Broadcasts are not forwarded across the routerD. Broadcasts are eliminatedE. Adding a router to the network decreases latencyF. Routers can generally support more LAN ports than switches
考题
In a Bridged 1483 network, what Layer 2 encapsulations are passed between the DSL bridge and the ERX?()
A. single ATM headerB. single Ethernet headerC. ATM header followed by a PPP headerD. ATM header followed by an Ethernet header
考题
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()
A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication
考题
Which two of these are characteristics of MPLS VPNs?()
A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
考题
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A. applicationB. presentationC. sessionD. transportE. internetF. data link
考题
The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that can be supported on each LAN if the organization is using one class C address block?()A.8B.6C.30D.32E.14F.16
考题
What are some of the advantages of using a router to segment the network (Choose two.)()。
A.Filtering can occur based on Layer 3 information.B.Broadcasts are eliminated.C.Routers generally cost less than switches.D.Broadcasts are not forwarded across the router.E.Adding a router to the network decreases latency.
考题
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。
A.VLAN supportB.compressionC.authenticationD.sliding windowsE.multilink supportF.quality of service
考题
FabricPath brings the benefits of routing protocols to layer 2 network Ethernet environments. What are the advantages of using FabricPath technology? () A、 FabricPath provides MAC address scalability with conversational learningB、 Loop mitigation with TTL in the frame fieldC、 STPl independenceD、 10 Gbps bandwidthE、 Layer 2 extensions between data centers
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
What layer of the TMN (telecommunications management network) model does CTM fit into?()A、Network management layerB、Element management layerC、Business management layerD、Network element layer
考题
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、data link
考题
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication
考题
What are some of the advantages of using a router to segment the network? (Choose two.)()A、Filtering can occur based on Layer 3 information.B、Broadcasts are eliminated.C、Routers generally cost less than switches.D、Broadcasts are not forwarded across the router.E、Adding a router to the network decreases latency.
考题
Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
考题
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、datalink
考题
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。A、VLAN supportB、compressionC、authenticationD、sliding windowsE、multilink supportF、quality of service
考题
What are some of the advantages of using a router to segment the network?()A、Filtering can occur based on Layer 3 information.B、Broadcasts are eliminated.C、Routers generally cost less than switches.D、Broadcasts are not forwarded across the router.E、Adding a router to the network decreases latency.
考题
多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch
考题
多选题What are some of the advantages of using a router to segment the network?()AFiltering can occur based on Layer 3 information.BBroadcasts are eliminated.CRouters generally cost less than switches.DBroadcasts are not forwarded across the router.EAdding a router to the network decreases latency.
考题
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A
applicationB
presentationC
sessionD
transportE
internetF
data link
考题
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A
applicationB
presentationC
sessionD
transportE
internetF
datalink
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题In a Bridged 1483 network, what Layer 2 encapsulations are passed between the DSL bridge and the ERX?()A
single ATM headerB
single Ethernet headerC
ATM header followed by a PPP headerD
ATM header followed by an Ethernet header
考题
单选题The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that can be supported on each LAN if the organization is using one class C address block?()A
8B
6C
30D
32E
14F
16
热门标签
最新试卷