网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
- A、NTP
- B、FTP
- C、RTP
- D、IGMP
参考答案
更多 “Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP” 相关考题
考题
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic
考题
Which of the following network hardware allows the MOST network traffic collisions?()
A.WAPB.HubC.SwitchD.Router
考题
Which three of the following basic network services are provided by the Cisco IOS?()A、Defines the network topologyB、Access to network resourcesC、Routing and switching functionsD、Content FilteringE、Intrusion Detection
考题
Which of the following network hardware allows the MOST network traffic collisions?()A、WAPB、HubC、SwitchD、Router
考题
Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
Which of the following server roles synchronizes time throughout the network?()A、DNSB、NTPC、DHCPD、SMTP
考题
Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping
考题
Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()A、Flexibility in relocating the computerB、Ability to provide secure data communicationsC、Faster data speedD、Ability to setup P2P networking
考题
Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
考题
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat
考题
Which of the following should be done FIRST when setting up a new p5-520 to be managed by a new HMC via a private network?()A、Change passwords in ASMIB、Add the managed system to the HMCC、Connect the p5-520 to a power sourceD、Connect the HMC and the p5-520 server’s HMC1 port to the same network
考题
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A
MPLS TE FRB
MPLS VPNC
BFDD
RSVPE
VPLSF
SNMP
考题
单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A
MeshB
BusC
RingD
Star
考题
多选题Which three of the following basic network services are provided by the Cisco IOS?()ADefines the network topologyBAccess to network resourcesCRouting and switching functionsDContent FilteringEIntrusion Detection
考题
单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()A
StarB
RingC
BusD
Mesh
考题
单选题Which of the following defines access for a network?()A
ACLB
RDFC
RASD
ARP
热门标签
最新试卷