网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When each routing device has a consistent view of the network topology, the network is said to be:()

  • A、fault tolerant
  • B、converged
  • C、autonomous
  • D、vectored

参考答案

更多 “When each routing device has a consistent view of the network topology, the network is said to be:()A、fault tolerantB、convergedC、autonomousD、vectored” 相关考题
考题 根据下面的文字资料回答 71~75 题 n the following essay,each blank has four choices.Choose the most suitable one from the four choices and write down in the answer sheet.Open Shortest Path First(OSPF)is a( 1 )routing algorithm that( 2 )work done on the OSI IS-IS intradomain routing protocol.This routing,as compared to distance-vector routing,requires( 3 )processing power.The Dijkstra algorithm is used to calculate( 4 )OSPF routing table updates only take place when necessary,( 5 )at regular intervals.第6题:文中( 1 )处正确的答案是( )。A.distance-vectorB.link-stateC.flow-basedD.selective flooding

考题 What is an advantage of multiple software processes running in the Junos OS?() A. Each process has its own protected memory space.B. Each process is started manually by the user at boot.C. All processes are dependent on each other.D. Multiple processes allow each routing protocol to be independent.

考题 You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.

考题 What is an advantage of multiple software process running in the Junos OS?() A. Each process has its own protected memory spaceB. Each process is started manually by the user at bootC. Aall processes are dependent on each otherD. Multiple processes allow each routing protocol to be independent

考题 When each routing device has a consistent view of the network topology, the network is said to be:() A. fault tolerantB. convergedC. autonomousD. vectored

考题 Which two statements are characteristics of a distance vector routing protocol?() A.RIP is an example of distance vector routing protocolsB.Updates are periodic and include the entire routing tableC.Routing updates are sent only after topology changesD.The protocol can be useful in hub-and-spoke and hierarchical networksE.Convergence is usually faster than with link state protocolsF.Each router has its own view of the topology

考题 Which two statements are characteristics of a distance vector routing protocol?()A、RIP is an example of distance vector routing protocolsB、Updates are periodic and include the entire routing tableC、Routing updates are sent only after topology changesD、The protocol can be useful in hub-and-spoke and hierarchical networksE、Convergence is usually faster than with link state protocolsF、Each router has its own view of the topology

考题 When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A、A routing table has changedB、The IP address has changedC、The system has become a gatewayD、A hacker is posing a threat to the system

考题 What is an advantage of multiple software process running in the Junos OS?()A、Each process has its own protected memory spaceB、Each process is started manually by the user at bootC、Aall processes are dependent on each otherD、Multiple processes allow each routing protocol to be independent

考题 When installing external SCSI devices, terminators are required on:()A、 the SCSI adapter.B、 each device.C、 the first device.D、 the last device.E、 the servers parallel port.

考题 Which two statements are characteristics of a distance vector routing protocol?()A、RIP is an example of distance vector routing protocols.B、Updates are periodic and include the entire routing table.C、Routing updates are sent only after topology changesD、The protocol can be useful in hub-and-spoke and hierarchical networks.E、Convergence is usually faster than with link state protocolsF、Each router has its own view of the topology

考题 Which statement describes the distributed call control model in VoIP networks?()A、The gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownB、The gateway voice-capable device has a local call routing table configured through a routing protocol.C、The gateway voice-capable device relies on a call agent to support call control.D、The gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

考题 Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 When using Device Manager, a red ‘X” indicates which of the following?()A、Device is disabledB、Device conflictC、No device driver foundD、Device has not been digitally signed

考题 When installing external SCSI devices, terminators are required on?()A、the SCSI adapter.B、each device.C、the first device.D、the last device.E、the server's parallel port.

考题 For NIM to install client machines located in a non-adjacent network, which routing must be defined?()  A、Boot/install servers will be required on each intermediate network.B、When an install is initiated by the client, routing is only required from the LPAR back to the NIM master.C、When an install is initiated by the NIM master, routing is only required from the NIM master to the client.D、Appropriate network NIM resources need to be defined to the NIM master to allow routing in both directions.

考题 Which of the following problems has occurred when a message appears on the system console indicating that a dump must be copied to external media? ()A、 The external dump device is full. B、 The dump device was not mirrored before the dump happened. C、 The boot failed while copying the dump from paging space to a file. D、 The dump device was not set to a paging device before the dump happened. 

考题 What is an advantage of multiple software processes running in the Junos OS?()A、Each process has its own protected memory space.B、Each process is started manually by the user at boot.C、All processes are dependent on each other.D、Multiple processes allow each routing protocol to be independent.

考题 Which two statements are true regarding an Ethernet collision domain?()A、The likelihood of collisions occurring increases when a switch is used.B、The likelihood of collisions occurring increases when a hub is used.C、If a hub is used, the collision domain is limited to each device and the hub.D、If a switch is used, the collision domain is limited to each device and the switch.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

考题 单选题What is an advantage of multiple software processes running in the Junos OS?()A Each process has its own protected memory spaceB Each process is started manually by the user at bootC All processes are dependent on each otherD Multiple processes allow each routing protocol to be independent

考题 多选题You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()ASelect L2TP/IPSec on each Windows Mobilebased device.BObtain and install a certificate on each Windows Mobilebased device.CConfigure the appropriate pre-shared key on each Windows Mobilebased device.DSelect Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

考题 单选题Which statement describes the distributed call control model in VoIP networks?()A The gateway voice-capable device is configured to support call control directly performing call setup, call maintenance, and call teardownB The gateway voice-capable device has a local call routing table configured through a routing protocol.C The gateway voice-capable device relies on a call agent to support call control.D The gateway voice-capable device relies on a gatekeeper to support call setup, call maintenance, and call teardown.

考题 多选题Which two statements are true regarding an Ethernet collision domain?()AThe likelihood of collisions occurring increases when a switch is used.BThe likelihood of collisions occurring increases when a hub is used.CIf a hub is used, the collision domain is limited to each device and the hub.DIf a switch is used, the collision domain is limited to each device and the switch.

考题 单选题When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A A routing table has changedB The IP address has changedC The system has become a gatewayD A hacker is posing a threat to the system

考题 单选题When using Device Manager, a red ‘X” indicates which of the following?()A Device is disabledB Device conflictC No device driver foundD Device has not been digitally signed