网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When each routing device has a consistent view of the network topology, the network is said to be:()
A

fault tolerant

B

converged

C

autonomous

D

vectored


参考答案

参考解析
解析: 暂无解析
更多 “单选题When each routing device has a consistent view of the network topology, the network is said to be:()A fault tolerantB convergedC autonomousD vectored” 相关考题
考题 When importing or exporting routing information using routing policy, the import or export is always done from which point of view?() A. routing tableB. forwarding tableC. routing protocolD. neighbor or peer

考题 What is an advantage of multiple software process running in the Junos OS?() A. Each process has its own protected memory spaceB. Each process is started manually by the user at bootC. Aall processes are dependent on each otherD. Multiple processes allow each routing protocol to be independent

考题 When each routing device has a consistent view of the network topology, the network is said to be:() A. fault tolerantB. convergedC. autonomousD. vectored

考题 Which two statements are characteristics of a distance vector routing protocol?()A、RIP is an example of distance vector routing protocolsB、Updates are periodic and include the entire routing tableC、Routing updates are sent only after topology changesD、The protocol can be useful in hub-and-spoke and hierarchical networksE、Convergence is usually faster than with link state protocolsF、Each router has its own view of the topology

考题 A view is created with the following statement:CREATE VIEW v1 AS SELECT col1, col2, col3 FROM t1 WHERE col4 1000 ; When will DB2 access the data from table T1 for view V1?()A、When view V1 is createdB、Each time the REFRESH VIEW v1 statement is executedC、Each time an SQL statement is executed against view V1D、Only the first time an SQL statement is executed against view V1

考题 When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A、A routing table has changedB、The IP address has changedC、The system has become a gatewayD、A hacker is posing a threat to the system

考题 What is an advantage of multiple software process running in the Junos OS?()A、Each process has its own protected memory spaceB、Each process is started manually by the user at bootC、Aall processes are dependent on each otherD、Multiple processes allow each routing protocol to be independent

考题 When installing external SCSI devices, terminators are required on:()A、 the SCSI adapter.B、 each device.C、 the first device.D、 the last device.E、 the servers parallel port.

考题 Which two statements are characteristics of a distance vector routing protocol?()A、RIP is an example of distance vector routing protocols.B、Updates are periodic and include the entire routing table.C、Routing updates are sent only after topology changesD、The protocol can be useful in hub-and-spoke and hierarchical networks.E、Convergence is usually faster than with link state protocolsF、Each router has its own view of the topology

考题 Which statement describes the distributed call control model in VoIP networks?()A、The gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownB、The gateway voice-capable device has a local call routing table configured through a routing protocol.C、The gateway voice-capable device relies on a call agent to support call control.D、The gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

考题 Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 When using Device Manager, a red ‘X” indicates which of the following?()A、Device is disabledB、Device conflictC、No device driver foundD、Device has not been digitally signed

考题 When installing external SCSI devices, terminators are required on?()A、the SCSI adapter.B、each device.C、the first device.D、the last device.E、the server's parallel port.

考题 When each routing device has a consistent view of the network topology, the network is said to be:()A、fault tolerantB、convergedC、autonomousD、vectored

考题 For NIM to install client machines located in a non-adjacent network, which routing must be defined?()  A、Boot/install servers will be required on each intermediate network.B、When an install is initiated by the client, routing is only required from the LPAR back to the NIM master.C、When an install is initiated by the NIM master, routing is only required from the NIM master to the client.D、Appropriate network NIM resources need to be defined to the NIM master to allow routing in both directions.

考题 When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A、routing tableB、forwarding tableC、routing protocolD、neighbor or peer

考题 What is an advantage of multiple software processes running in the Junos OS?()A、Each process has its own protected memory space.B、Each process is started manually by the user at boot.C、All processes are dependent on each other.D、Multiple processes allow each routing protocol to be independent.

考题 When attepting to view the OSPF routes in the routing table, you issue the command show route table inet but no OSPF routes are displayed. What is the problem?()A、The OSPF routes are located in the inet 4 routing tableB、THe OSPF routes are located in the inet 0 routing tableC、The OSPF routes are located in the inet 2 routing tableD、The OSPF routes are located in the inet 4.3 routing table

考题 Which two statements are true regarding an Ethernet collision domain?()A、The likelihood of collisions occurring increases when a switch is used.B、The likelihood of collisions occurring increases when a hub is used.C、If a hub is used, the collision domain is limited to each device and the hub.D、If a switch is used, the collision domain is limited to each device and the switch.

考题 Which one of the following parameters must be specified when exporting objects that has integrity constraints referencing objects that are currently being accessed by other users?()A、IGNORE=YB、DIRECT=YC、CONSISTENT=YD、BUFFER=Y

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

考题 You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A、Use Event Viewer to review the application logs on each of the seven servers.B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C、Use Task Manager to view the performance data on each of the seven servers.D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

考题 单选题When importing or exporting routing information using routing policy, the import or export is always done from which point of view?()A routing tableB forwarding tableC routing protocolD neighbor or peer

考题 单选题When attepting to view the OSPF routes in the routing table, you issue the command show route table inet but no OSPF routes are displayed. What is the problem?()A The OSPF routes are located in the inet 4 routing tableB THe OSPF routes are located in the inet 0 routing tableC The OSPF routes are located in the inet 2 routing tableD The OSPF routes are located in the inet 4.3 routing table

考题 单选题Which statement describes the distributed call control model in VoIP networks?()A The gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownB The gateway voice-capable device has a local call routing table configured through a routing protocol.C The gateway voice-capable device relies on a call agent to support call control.D The gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

考题 多选题Which two statements are true regarding an Ethernet collision domain?()AThe likelihood of collisions occurring increases when a switch is used.BThe likelihood of collisions occurring increases when a hub is used.CIf a hub is used, the collision domain is limited to each device and the hub.DIf a switch is used, the collision domain is limited to each device and the switch.

考题 单选题When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A A routing table has changedB The IP address has changedC The system has become a gatewayD A hacker is posing a threat to the system

考题 单选题When using Device Manager, a red ‘X” indicates which of the following?()A Device is disabledB Device conflictC No device driver foundD Device has not been digitally signed