网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()
A
RARP request
B
Show Network Address request
C
Proxy ARP request
D
ARP request
E
Show Hardware Address request
参考答案
参考解析
解析:
暂无解析
更多 “单选题When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()A RARP requestB Show Network Address requestC Proxy ARP requestD ARP requestE Show Hardware Address request” 相关考题
考题
Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)
A. regular upgrade processB. multivendor supportC. cost savingsD. product varietyE. well-tested interoperability
考题
Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5
考题
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()
A. RARP requestB. Show Network Address requestC. Proxy ARP requestD. ARP requestE. Show Hardware Address request
考题
When a DHCP server is configured, which two IP addresses should never be assignable to hosts?()
A. network or subnetwork IP addressB. broadcast address on the networkC. IP address leased to the LAND. IP address used by the interfacesE. manually assigned address to the clientsF. designated IP address to the DHCP server
考题
When a host transmits data across a network to another host, which process does the data go through?()
A.standardizationB.conversionC.encapsulationD.synchronization
考题
Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)A、regular upgrade processB、multivendor supportC、cost savingsD、product varietyE、well-tested interoperability
考题
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()A、network or subnetwork IP addressB、broadcast address on the networkC、IP address leased to the LAND、IP address used by the interfacesE、manually assigned address to the clientsF、designated IP address to the DHCP server
考题
A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router
考题
When one connection to a host fails in a full mesh network, which of the following is true?()A、All hosts can communicate.B、No hosts can communicate.C、Half of the hosts will lose communication.D、Only the two hosts between the failed connection will lose communication.
考题
In an Ethernet network, under what two scenarios can devices transmit?()A、when they receive a special tokenB、when there is a carrierC、when they detect no other devices are sendingD、when the medium is idleE、when the server grants access
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
考题
When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization
考题
When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A、RARP requestB、Show Network Address requestC、Proxy ARP requestD、ARP requestE、Show Hardware Address request
考题
What is the purpose of assigning an IP address to a switch?()A、Provides local hosts with a default gateway addressB、Allows remote management of the switch.C、Allows the switch to respond to ARP requests between two hostsD、Ensures that hosts on the same LAN can communicate with each other.
考题
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches
考题
When installing a wireless network in a large area, which of the following is the FIRST thing thatshould be considered when trying to get the MOST coverage?()A、SSID namingB、Device placementC、Encryption methodsD、Channel selection
考题
A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()A、iptraceB、netstatC、tcpdumpD、traceroute
考题
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts
考题
Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)A、Packet Flow AccelerationB、Network Sequence CachingC、AppFlow's MAPI accelerationD、Molecular Sequence Reduction
考题
What are two routing requirements for a device to communicate with another device?()A、end-to-end communications pathB、hosts on the same Layer 2 broadcast domainC、hosts on the same Layer 3 broadcast domainD、routing information on participating Layer 3 devices
考题
When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?()A、 Coherence uses a more efficient TCMP algorithm going from two to four cache serversB、 When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of workC、 Near cache is enabled with a larger quorum thus performance is improvedD、 all of the above
考题
You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes Which two actions should you recommend?()A、From Hyper-V Manager on each node, configure one virtual network.B、From Hyper-V Manager on one node, configure two virtual networks.C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.D、Install two network adapters on each node. Configure the network adapters to communicate on separate subnets.
考题
多选题Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)Aregular upgrade processBmultivendor supportCcost savingsDproduct varietyEwell-tested interoperability
考题
单选题When one connection to a host fails in a full mesh network, which of the following is true?()A
All hosts can communicate.B
No hosts can communicate.C
Half of the hosts will lose communication.D
Only the two hosts between the failed connection will lose communication.
考题
单选题When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A
RARP requestB
Show Network Address requestC
Proxy ARP requestD
ARP requestE
Show Hardware Address request
考题
单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A
a router with subinterfaces configured on the physical interface that is connected to the switchB
a router with an IP address on the physical interface connected to the switchC
a switch with an access link that is configured between the switchesD
a switch with a trunk link that is configured between the switches
考题
单选题A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A
For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B
For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.C
Direct inter-vlan communication does not require OSPFD
OSPF cannot be used if router-on-a-stick is configured on the router
考题
单选题Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2.DC1 hosts a primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com.You need to ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must provide authoritative responses to client computers.What should you do?()A
Configure the contoso.com zone to use DNSSECB
Create a new delegation in the contoso.com zoneC
Modify the zone transfer settings of the contoso.com zoneD
Convert the contoso.com zone to an Active Directory-integrated zone
热门标签
最新试卷