网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
- A、It ensures that data is retransmitted if an acknowledgment is not received.
- B、It reassembles segments in the correct order on the destination device.
- C、It provides a mechanism for the receiver to control the transmission speed.
- D、It regulates the size of each datagram segment.
- E、All of the above are functions of flow control
参考答案
更多 “Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A、It ensures that data is retransmitted if an acknowledgment is not received.B、It reassembles segments in the correct order on the destination device.C、It provides a mechanism for the receiver to control the transmission speed.D、It regulates the size of each datagram segment.E、All of the above are functions of flow control” 相关考题
考题
As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)A.It enables equipment from different vendors to use the same electronic components, thus saving research and development fundsB.It encourages industry standardization by defining what functions occur at each layer of the modelC.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshootingD.It provides a means by which changes in functionality in one layer require changes in other layersE.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers
考题
()is preservation of confidentiality, integrity and availability of information, in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved。A、Equipment securityB、Network securityC、Information securityD、Content security
考题
Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are (66) . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate (67) of all networked users.2. The ability to deploy switching capabilities incrementally into the (68) base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing routed environments. Switching (69) routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration.(70) play a critical role in the integration of switching into existing networks.A.switch-based LANsB.WANsC.user servicesD.LAN-BY-PHONE
考题
Rapid advances in computer and communication technologies have resulted in the(71) merger of these two fields. The lines have bluned among computing, switching, and digital transmission equipment, and the same digital techniques are being used for data, voice, and image transmission. Merging and evolving technologies, coupled with increasing demands for efficient and timely collection, processing, and(72) of information, are leading to the development of(73) that transmit and process all types of data. The ultimate goal of this evolution is something its proponents-some of the most powerful forces in the computing and telecommunications industries-call the (74) .The (74) will be a worldwide public telecommunications network that will deliver a wide variety of services. The (74) will be defined by the standardization of user interfaces, and will be implemented as a set of digital switches and paths supporting a broad range of traffic types and providing (75) processing services. Inpractice, there will be multiple networks, implemented within national boundaries, but from the user's point of view there will be a single, uniformly accessible worldwide network.A.decreasingB.increasingC.collectiveD.single
考题
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP
考题
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments in the correct order on the destination device.C. It provides a mechanism for the receiver to control the transmission speed.D. It regulates the size of each datagram segment.E. All of the above are functions of flow control
考题
What should be part of a comprehensive network security plan()。
A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates
考题
Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment
考题
What is a benefit of implementing a Cisco End-to-End Solution?()A、It maximizes the network securityB、It increase the cost of the equipmentC、It enables the network to work as a unified wholeD、It reduces the Cost of equipment
考题
In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD、the optimal technologies for supporting its business requirements and objectives
考题
Which three best describe the partner benefits of the Cisco Lifecycle Services approach?()A、Improve customer satisfaction ratesB、Improve the skill sets of their staff membersC、Increase their staff productivityD、Reduce the risk involved with deploying and supporting new and complex technologiesE、Improve response times for network outagesF、Help ensure that suppliers are meeting metrics
考题
What does most service requests coming to Cisco TAC concern?()A、 equipment defectsB、 equipment failuresC、 complex network operation and management issuesD、 integrating mixed vendor equipment
考题
过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()A、Attack ProtectionB、ReconnaissanceC、Traffic NormalizationsD、Network Equipment ProtectionE、Security PolicyF、Informational
考题
The integrated logistics activities, equipment and information network and so on, is called ()A、logistics integrationB、logistics industryC、logistics centerD、logistics park
考题
What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.
考题
You need to configure port security on switch R1. Which two statements are true about this technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default. E、 Port security cannot be configured for ports supporting VoIP.
考题
A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house
考题
多选题A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)AThe length of the houseBHow many rooms are in the houseCHow many users will be using the wireless networkDThe building material of the houseEThe cost of the house
考题
多选题Which three best describe the partner benefits of the Cisco Lifecycle Services approach?()AImprove customer satisfaction ratesBImprove the skill sets of their staff membersCIncrease their staff productivityDReduce the risk involved with deploying and supporting new and complex technologiesEImprove response times for network outagesFHelp ensure that suppliers are meeting metrics
考题
单选题What is the benefit of implementing a Cisco end-to-end solution?()A
It enables the network to work as a unified wholeB
It maximizes the network securityC
It increases the cost of the equipmentD
It reduces the cost of the equipment
考题
单选题In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A
an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB
a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC
an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD
the optimal technologies for supporting its business requirements and objectives
考题
多选题You need to configure port security on switch R1. Which two statements are true about this technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.
考题
多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment
考题
多选题Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Virtual machines (VMs) will use Microsoft iSCSI Software Initiator to connect to the shared storage volumes within the guest operating system. You need to configure the VMM host server to optimize the network environment for iSCSI traffic. Which two actions should you perform?()ASet the network adapters to 1454 MTU.BSet the network adapters and the supporting infrastructure to support jumbo frames.CEnable RX and TX TCP checksum offload support on the network adapters.DDisable RX and TX TCP checksum offload support on the network adapters.
考题
单选题What does most service requests coming to Cisco TAC concern?()A
equipment defectsB
equipment failuresC
complex network operation and management issuesD
integrating mixed vendor equipment
考题
单选题What should be part of a comprehensive network security plan()。A
Allow users to develop their own approach to network securityB
Physically secure network equipment from potential access by unauthorized individualsC
Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD
Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE
Minimize network overhead by deactivating automatic antivirus client updates
考题
单选题Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A
It ensures that data is retransmitted if an acknowledgment is not received.B
It reassembles segments in the correct order on the destination device.C
It provides a mechanism for the receiver to control the transmission speed.D
It regulates the size of each datagram segment.E
All of the above are functions of flow control
热门标签
最新试卷