网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which protocol creates a complete database of the network topology prior to calculating the optimal route?()

  • A、BGP
  • B、PIM
  • C、OSPF
  • D、RIP

参考答案

更多 “Which protocol creates a complete database of the network topology prior to calculating the optimal route?()A、BGPB、PIMC、OSPFD、RIP” 相关考题
考题 TCP/IP is a communication protocol, which provides many different networking services. The TCP/IP Internet protocol suite is formed from two standards: the TCP (Transmission Control Protocol) and the IP(Internet Protocol).(72) means it is on the transport layer.A.ISOB.IPC.OSID.TCP

考题 While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.A.channelsB.Web browserC.Internet dataD.Internet architecture

考题 A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()A. EAP-TLSB. EAP-MD5C. PAPD. EAP-MSCHAPv2

考题 ()is a collection of data sets,which is so large and complet that is because difficult to process using on hand database management tools or traditional data peocessing applicationsA.big dataB.clusterC.parallel computingD.data warehouse

考题 IS - IS creates and maintains adjacencies and neighbor relations by using the Hello protocol. For the following options, which are Hello packets used in IS - IS?() A. A generic HelloB. Point - to - point Level 1, point - to -point Level 2, LAN Level 1, LAN Level 2C. Point - to - point Level 1, point - to - point Level 2, LAND. Point - to - point, LAN Level 1, LAN Level 2

考题 Open Shortes t Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF).Which two statements best describe the OSPF link - state routing pro tocol?()A. OSPF sends updates every 10 secondsB. OSPF sends triggered updates when a network change occursC. When a link state is changed, the router that detected the change creates a link - state advertisement (LSA) and propagates it to all OSPF devices using the 224.0.0.6 multicast addressD. OSPF sends summaries of individual link- state entries every 30 minutes to ensure LSDB synchronization

考题 A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A、EAP-TLSB、EAP-MD5C、PAPD、EAP-MSCHAPv2

考题 What is a benefit of Internet protocol (IP) telephony?()A、Synchronizes password exchanges for call setupB、Eliminates the need for physical cabling in a TCP/IP networkC、Enables two-way voice transmission over a packet-switched TCP/IP networkD、Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network

考题 Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true

考题 Open Shortes t Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). Which two statements best describe the OSPF link - state routing pro tocol?()A、OSPF sends updates every 10 secondsB、OSPF sends triggered updates when a network change occursC、When a link state is changed, the router that detected the change creates a link - state advertisement (LSA) and propagates it to all OSPF devices using the 224.0.0.6 multicast addressD、OSPF sends summaries of individual link- state entries every 30 minutes to ensure LSDB synchronization

考题 Which of the following is a disadvantage of using the EIGRP protocol?()A、It does not scale wellB、It converges slower than OSPFC、It is a proprietary protocolD、It is a distance vector protocol

考题 Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA

考题 Which device creates an OEO conversion? ()A、 amplifierB、 attenuatorC、 regeneratorD、 light emitterE、 optical switchF、 optical receiverG、 fiber-optic cable

考题 Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.

考题 Which of the following is an EGP routing protocol?()A、IGPB、OSPFC、BGPD、RIP

考题 Which command creates an image copy?()A、 backup as copyB、 backup copyC、 copy as backupD、 copy back

考题 An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS

考题 单选题IS - IS creates and maintains adjacencies and neighbor relations by using the Hello protocol. For the following options, which are Hello packets used in IS - IS?()A A generic HelloB Point - to - point Level 1, point - to -point Level 2, LAN Level 1, LAN Level 2C Point - to - point Level 1, point - to - point Level 2, LAND Point - to - point, LAN Level 1, LAN Level 2

考题 单选题Which protocol supports LDP sessions?()A SIP (port 626)B TCP (port 646)C UDP (port 606)D IP (protocol code LDP)

考题 单选题Which device creates an OEO conversion?()A amplifierB attenuatorC regeneratorD light emitterE optical switchF optical receiverG fiber-optic cable

考题 单选题Which command creates an image copy?()A  backup as copyB  backup copyC  copy as backupD  copy back

考题 单选题Which protocol creates a complete database of the network topology/prior to calculating the optimal route?()A BGPB PIMC OSPFD RIP

考题 单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A EAP-TLSB EAP-MD5C PAPD EAP-MSCHAPv2

考题 单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()A It is a label distribution protocol for MPLSB It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC Tag distribution Protocol (TDP) was the basis for LDPD All of the above are true

考题 单选题You need to recommend which protocol to use for the planned App-V deployment. Which protocol should you recommend?()A SMBB RTSPSC CIFSD HTTPS

考题 单选题Which explanation describes a wireless client IGMP multicast join request using a Cisco Unified Wireless Network v5.2 architecture of AP to WLAN controller?()A passed by the AP to its connected switch and then forwarded directly to the connected router,which creates an MGID table entryB passed by the AP to the WLAN controller and then forwarded to the source PIM-enabled router,which creates an MGID table entryC passed by the AP to the WLAN controller, which creates an MGID table entry before forwarding to the directly connected PIM-enabled routerD passed by the AP to its connected switch and then forwarded to the rendezvous point router,which creates an MGID table entry