网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Intermediate system to intermediate system (IS - IS), is a protocol used by network devices (routers) to determine the best way to forward datagrams through a packet - switched network, a process called routing. Which three attributes are of the IS - IS routing protocol? ()
- A、supports VLSM
- B、link - state routing protocol
- C、operati on is similar to BGP
- D、supports two routing levels within an autonomous system
参考答案
更多 “ Intermediate system to intermediate system (IS - IS), is a protocol used by network devices (routers) to determine the best way to forward datagrams through a packet - switched network, a process called routing. Which three attributes are of the IS - IS routing protocol? () A、supports VLSMB、link - state routing protocolC、operati on is similar to BGPD、supports two routing levels within an autonomous system” 相关考题
考题
在优先权相同的情况下选举Designated Intermediate System(DIS),则()。
A.最大MAC地址表示最高优先权B.最大MAC地址表示最低优先权C.最小MAC地址表示最高优先权D.最小MAC地址表示最低优先权
考题
Intermediate system to intermediate system (IS - IS), is a protocol used by network devices (routers) to determine the best way to forward datagrams through a packet - switched network, a process called routing. Which three attributes are of the IS - IS routing protocol? ()A. supports VLSMB. link - state routing protocolC. operati on is similar to BGPD. supports two routing levels within an autonomous system
考题
IS - IS is often considered an alternative to OSPF in the IP world. Which two statements identify similarities between IS -IS and OSPF?()A、support for designated intermediate systems and backup designated intermediate systemsB、support for multip le areas per routerC、support for classless routingD、support for address summarization between areasE、support for both DIS adjacencies and neighbor adjacencies
考题
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
考题
在优先权相同的情况下选举Designated Intermediate System(DIS),则()。A、最大MAC地址表示最高优先权B、最大MAC地址表示最低优先权C、最小MAC地址表示最高优先权D、最小MAC地址表示最低优先权
考题
What three major tasks are performed by a Designated Intermediate System in an ISIS pseudonodeenvironment?()A、Updating the pseudonode LSPB、maintaining pseudonode link-state informationC、creating the pseudonodeD、flooding LSPs over the LANE、election of the pseudonode
考题
A company with three sites (one local production site, one intermediate site, and one remote site) wants to use Metro/Global Mirror. Which statement is correct about the volumes at the intermediate site()A、the intermediate site volumes are Metro Mirror target volumes for the remote siteB、the intermediate site volumes are Global Mirror target volumes for the remote siteC、the intermediate site volumes are both Global Mirror source and Metro Mirror target at the same timeD、the intermediate site volumes are alsoFlashCopy sources for the remote site
考题
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company uses an Enterprise Root certification authority (CA) and an Enterprise Intermediate CA. The Enterprise Intermediate CA certificate expires. You need to deploy a new Enterprise Intermediate CA certificate to all computers in the domain. What should you do()A、Import the new certificate into the Intermediate Certification Store on the Enterprise Root CA server.B、Import the new certificate into the Intermediate Certification Store on the Enterprise Intermediate CA server.C、Import the new certificate into the Intermediate Certification Store in the Default Domain Controllers group policy object.D、Import the new certificate into the Intermediate Certification Store in the Default Domain group policy object.
考题
单选题In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?()A
highest router ID first, then highest priorityB
highest MAC address first, then highest priorityC
highest router ID first, then highest MAC addressD
highest priority first, then highest router IDE
highest priority first, then highest MAC address
考题
单选题An Intermediate System experiencing memory problems indicates that it may have incomplete data by setting which bit in its LSP?()A
more bitB
partition bitC
attached bitD
overload bit
考题
单选题In the management of the shafting, because() carry heavy load and caused high temperature easily, it should be paid attention.A
the bearing near to the diesel engineB
the intermediate bearing near to the thrust bearingC
the intermediate bearing near to the sterntubeD
the bearing located at the middle of the diesel engine and the sterntube
考题
多选题What three major tasks are performed by a Designated Intermediate System in an ISIS pseudonodeenvironment?()AUpdating the pseudonode LSPBmaintaining pseudonode link-state informationCcreating the pseudonodeDflooding LSPs over the LANEelection of the pseudonode
考题
单选题You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()A
Specify a protection level of None in the contract for the intermediate service. Disable message and transport security from the client application configuration file.B
Specify a protection level of Sign in the contract for the intermediate service. Disable transport security from the client application configuration file.C
Modify the binding on the intermediate service to use netNamedPipeBinding.D
Modify the binding on the intermediate service to use webHttpBinding.
考题
单选题在优先权相同的情况下选举Designated Intermediate System(DIS),则()。A
最大MAC地址表示最高优先权B
最大MAC地址表示最低优先权C
最小MAC地址表示最高优先权D
最小MAC地址表示最低优先权
考题
多选题IS - IS is often considered an alternative to OSPF in the IP world. Which two statements identify similarities between IS -IS and OSPF?()Asupport for designated intermediate systems and backup designated intermediate systemsBsupport for multip le areas per routerCsupport for classless routingDsupport for address summarization between areasEsupport for both DIS adjacencies and neighbor adjacencies
考题
单选题A company with three sites (one local production site, one intermediate site, and one remote site) wants to use Metro/Global Mirror. Which statement is correct about the volumes at the intermediate site()A
the intermediate site volumes are Metro Mirror target volumes for the remote siteB
the intermediate site volumes are Global Mirror target volumes for the remote siteC
the intermediate site volumes are both Global Mirror source and Metro Mirror target at the same timeD
the intermediate site volumes are alsoFlashCopy sources for the remote site
考题
单选题In the American educational system, intermediate school is the _____ stage between the primary grades and high schoo1.A
traditionalB
transitionalC
transmissibleD
transient
热门标签
最新试卷