网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()

  • A、Switch
  • B、Hub
  • C、Modem
  • D、Repeater

参考答案

更多 “Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater” 相关考题
考题 The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.Which of the following are layer 1 devices that you can use? (Choose all that apply.)A.A switchB.A routerC.A network adapter cardD.A hubE.A repeater

考题 Which of the following devices replicates and passes data to all devices connected to it?() A.SwitchB.RouterC.BridgeD.Hub

考题 Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?() A.HubB.VLANC.RouterD.Server

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?() A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch

考题 Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?() A.GBICB.HubC.BridgeD.Modem

考题 Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?() A.SwitchB.HubC.ModemD.Repeater

考题 Which of the following interfaces is used to connect analog devices to the Internet?() A.POTSB.ATMC.VDSLD.SDSL

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 Which of the following devices is used to connect a WAN to a LAN?() A.Basic routerB.Basic switchC.BridgeD.Repeater

考题 Which of the following network protocols is used to ensure consistent time across network devices on the domain?() A.NTPB.FTPC.RTPD.IGMP

考题 You are the network administrator tasked with designing a switching solution for the Company  network.  Which of the following statements describing trunk links are INCORRECT?()A、 The trunk link belongs to a specific VLAN.B、 Multiple trunk links are used to connect multiple end user devices.C、 A trunk link only supports native VLAN.D、 Trunk links use 802.10 to identify a VLAN.E、 The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.

考题 Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch

考题 Which of the following devices replicates and passes data to all devices connected to it?()A、SwitchB、RouterC、BridgeD、Hub

考题 Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()A、GBICB、HubC、BridgeD、Modem

考题 Which of the following devices is used to connect a WAN to a LAN?()A、Basic routerB、Basic switchC、BridgeD、Repeater

考题 Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

考题 Which of the following interfaces is used to connect analog devices to the Internet?()A、POTSB、ATMC、VDSLD、SDSL

考题 Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

考题 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

考题 Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server

考题 Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

考题 On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC

考题 Rewrite rules are used in which CoS scenario?()A、When a single device is configured to provide differentiated services.B、When multiple devices in a network are configured to use CoS to provide differentiated services.C、When a device is used to connect to another autonomous system.D、When CoS is used to classifiy traffic as low priority.

考题 单选题Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A SwitchB HubC ModemD Repeater

考题 单选题Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A SwitchB RepeaterC HubD WAP