网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which protocol creates a complete database of the network topology prior to calculating the optimal route?()
- A、BGP
- B、PIM
- C、OSPF
- D、RIP
参考答案
更多 “Which protocol creates a complete database of the network topology prior to calculating the optimal route?()A、BGPB、PIMC、OSPFD、RIP” 相关考题
考题
TCP/IP is a communication protocol, which provides many different networking services. The TCP/IP Internet protocol suite is formed from two standards: the TCP (Transmission Control Protocol) and the IP(Internet Protocol).(72) means it is on the transport layer.A.ISOB.IPC.OSID.TCP
考题
While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.A.channelsB.Web browserC.Internet dataD.Internet architecture
考题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()A. EAP-TLSB. EAP-MD5C. PAPD. EAP-MSCHAPv2
考题
()is a collection of data sets,which is so large and complet that is because difficult to process using on hand database management tools or traditional data peocessing applicationsA.big dataB.clusterC.parallel computingD.data warehouse
考题
IS - IS creates and maintains adjacencies and neighbor relations by using the Hello protocol. For the following options, which are Hello packets used in IS - IS?()
A. A generic HelloB. Point - to - point Level 1, point - to -point Level 2, LAN Level 1, LAN Level 2C. Point - to - point Level 1, point - to - point Level 2, LAND. Point - to - point, LAN Level 1, LAN Level 2
考题
Open Shortes t Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF).Which two statements best describe the OSPF link - state routing pro tocol?()A. OSPF sends updates every 10 secondsB. OSPF sends triggered updates when a network change occursC. When a link state is changed, the router that detected the change creates a link - state advertisement (LSA) and propagates it to all OSPF devices using the 224.0.0.6 multicast addressD. OSPF sends summaries of individual link- state entries every 30 minutes to ensure LSDB synchronization
考题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A、EAP-TLSB、EAP-MD5C、PAPD、EAP-MSCHAPv2
考题
What is a benefit of Internet protocol (IP) telephony?()A、Synchronizes password exchanges for call setupB、Eliminates the need for physical cabling in a TCP/IP networkC、Enables two-way voice transmission over a packet-switched TCP/IP networkD、Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network
考题
Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true
考题
Open Shortes t Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF). Which two statements best describe the OSPF link - state routing pro tocol?()A、OSPF sends updates every 10 secondsB、OSPF sends triggered updates when a network change occursC、When a link state is changed, the router that detected the change creates a link - state advertisement (LSA) and propagates it to all OSPF devices using the 224.0.0.6 multicast addressD、OSPF sends summaries of individual link- state entries every 30 minutes to ensure LSDB synchronization
考题
Which of the following is a disadvantage of using the EIGRP protocol?()A、It does not scale wellB、It converges slower than OSPFC、It is a proprietary protocolD、It is a distance vector protocol
考题
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA
考题
Which device creates an OEO conversion? ()A、 amplifierB、 attenuatorC、 regeneratorD、 light emitterE、 optical switchF、 optical receiverG、 fiber-optic cable
考题
Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.
考题
Which command creates an image copy?()A、 backup as copyB、 backup copyC、 copy as backupD、 copy back
考题
An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS
考题
单选题IS - IS creates and maintains adjacencies and neighbor relations by using the Hello protocol. For the following options, which are Hello packets used in IS - IS?()A
A generic HelloB
Point - to - point Level 1, point - to -point Level 2, LAN Level 1, LAN Level 2C
Point - to - point Level 1, point - to - point Level 2, LAND
Point - to - point, LAN Level 1, LAN Level 2
考题
单选题Which protocol supports LDP sessions?()A
SIP (port 626)B
TCP (port 646)C
UDP (port 606)D
IP (protocol code LDP)
考题
单选题Which device creates an OEO conversion?()A
amplifierB
attenuatorC
regeneratorD
light emitterE
optical switchF
optical receiverG
fiber-optic cable
考题
单选题Which command creates an image copy?()A
backup as copyB
backup copyC
copy as backupD
copy back
考题
单选题Which protocol creates a complete database of the network topology/prior to calculating the optimal route?()A
BGPB
PIMC
OSPFD
RIP
考题
单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A
EAP-TLSB
EAP-MD5C
PAPD
EAP-MSCHAPv2
考题
单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()A
It is a label distribution protocol for MPLSB
It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC
Tag distribution Protocol (TDP) was the basis for LDPD
All of the above are true
考题
单选题You need to recommend which protocol to use for the planned App-V deployment. Which protocol should you recommend?()A
SMBB
RTSPSC
CIFSD
HTTPS
考题
单选题Which explanation describes a wireless client IGMP multicast join request using a Cisco Unified Wireless Network v5.2 architecture of AP to WLAN controller?()A
passed by the AP to its connected switch and then forwarded directly to the connected router,which creates an MGID table entryB
passed by the AP to the WLAN controller and then forwarded to the source PIM-enabled router,which creates an MGID table entryC
passed by the AP to the WLAN controller, which creates an MGID table entry before forwarding to the directly connected PIM-enabled routerD
passed by the AP to its connected switch and then forwarded to the rendezvous point router,which creates an MGID table entry
热门标签
最新试卷