网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
- A、Switch
- B、Hub
- C、Modem
- D、Repeater
参考答案
更多 “Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater” 相关考题
考题
The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.Which of the following are layer 1 devices that you can use? (Choose all that apply.)A.A switchB.A routerC.A network adapter cardD.A hubE.A repeater
考题
Which of the following devices replicates and passes data to all devices connected to it?()
A.SwitchB.RouterC.BridgeD.Hub
考题
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()
A.HubB.VLANC.RouterD.Server
考题
A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()
A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch
考题
Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()
A.GBICB.HubC.BridgeD.Modem
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A.SwitchB.HubC.ModemD.Repeater
考题
Which of the following interfaces is used to connect analog devices to the Internet?()
A.POTSB.ATMC.VDSLD.SDSL
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
A.IDSB.VPNC.NIPSD.HIDS
考题
Which of the following devices is used to connect a WAN to a LAN?()
A.Basic routerB.Basic switchC.BridgeD.Repeater
考题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
A.NTPB.FTPC.RTPD.IGMP
考题
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()A、 The trunk link belongs to a specific VLAN.B、 Multiple trunk links are used to connect multiple end user devices.C、 A trunk link only supports native VLAN.D、 Trunk links use 802.10 to identify a VLAN.E、 The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
考题
Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch
考题
Which of the following devices replicates and passes data to all devices connected to it?()A、SwitchB、RouterC、BridgeD、Hub
考题
Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()A、GBICB、HubC、BridgeD、Modem
考题
Which of the following devices is used to connect a WAN to a LAN?()A、Basic routerB、Basic switchC、BridgeD、Repeater
考题
Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP
考题
Which of the following interfaces is used to connect analog devices to the Internet?()A、POTSB、ATMC、VDSLD、SDSL
考题
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch
考题
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch
考题
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server
考题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
考题
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
考题
Rewrite rules are used in which CoS scenario?()A、When a single device is configured to provide differentiated services.B、When multiple devices in a network are configured to use CoS to provide differentiated services.C、When a device is used to connect to another autonomous system.D、When CoS is used to classifiy traffic as low priority.
考题
单选题Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A
SwitchB
HubC
ModemD
Repeater
考题
单选题Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A
SwitchB
RepeaterC
HubD
WAP
热门标签
最新试卷