网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
( ) It is the WAN transmission technology after IP technology. It uses data label to guide data packet to transmit in open communication network with high speed and high efficiency, and introduces connection mode in a connectionless network, which reduces network complexity.
下列 是继IP 技术之后的广域网传输技术,利用数据标签引导数据包在开放的通信网络上进行高速、高效传输,在一个无连接的网络中引入连接模式,减少了网络复杂性。


A.FTP
B.MPLS
C.TCP/IP
D.ATM

参考答案

参考解析
解析:MPLS(Multi-Protocol Label Switching,多协议标签交换技术)是一种广域网络技术。它是继目前网络界最流行的IP 技术以来的新一代广域网传输技术。MPLS 充分利用数据标签引导数据包在开放的通信网络上进行高速、高效的传输,通过在一个无连接的网络中引入连接模式,减少了网络复杂性,并能兼容现有各种主流网络技术,大大降低了网络成本。在提高IP 业务性能的同时,能确保网络通信的服务质量和数据传输的安全性。
更多 “( ) It is the WAN transmission technology after IP technology. It uses data label to guide data packet to transmit in open communication network with high speed and high efficiency, and introduces connection mode in a connectionless network, which reduces network complexity. 下列 是继IP 技术之后的广域网传输技术,利用数据标签引导数据包在开放的通信网络上进行高速、高效传输,在一个无连接的网络中引入连接模式,减少了网络复杂性。 A.FTP B.MPLS C.TCP/IP D.ATM ” 相关考题
考题 The approaching 4G mobile communication systems are projected to ( ) still remaining problems of 3G systems and to provide ( ) new services ,from high-quality voice to high-definition video to high data-rate wireless channels.[1分]A.solveB.solvingC.reduceD.increase

考题 Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?() A.Both technologies guarantee an identical copy of data on the secondary nodeB.Only MySQL can maintain a time-delayed copy of data on the secondary nodeC.Both technologies use the TCP/IP stack as their primary transmission mediumD.DRBD uses shared-disk technology

考题 Most IP layer-based proxy mechanisms,such as network address translation (NAT),only supportuni-directional proxy,from the internal network to external network(the Interned.The proxvestablishes the communication channel by (71) IP addresses.The IP addresses must be (72) .These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels,such as,multimedia applications.IP layer-based proxy mechanisms need additional software (73) for each application that uses (74) channels. SOCKS identifies communication targets through domain names,overcoming the restriction of Usina private IP addresses.SOCKS can use domain names to establish communication between separate LANs,with (75) IP addresses.(66)A.manufacturingB.manipulatingC.conductD.implement

考题 A typical application of this(71)is ADSL. It is emerging as the technology for home-and small-office Internet connectivity. It provides either 1.5 Mb/s~8 Mb/s from the network to the user and 64 Kb/s~512 Kb/s in the reverse direction depending on the distance, 12 000 or 18 000 feet.. The different speed for each direction gives it the(72)label. ADSL is designed to take advantage of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user(73)a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is just fine. ADSL delivers high(74)where you need it and only uses a single copper pair. Through multiplexing, it also reserves(75)of the bandwidth for POTS.A.FTTHB.HFCC.FTTCD.HDSL

考题 The high-speed data services for the interconnection of computer networks are usually referred to as ______ connections.A.LANsB.MANsC.WANsD.ATM

考题 Microwave communication uses high-frequency(56)waves that travel in straightlines through the air. Because the waves cannot(57)with the curvature of the earth, they can be(58)only over short distance. Thus, microwave is a good(59)for sending data between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of "dishes" or(60).These can be installed on towers, high buildings, and mountain tops.A.opticalB.radioC.electricalD.magnetic

考题 For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).A.E-mail B.Intemet C.network D.protocols

考题 An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.A.addressB.deviceC.pointD.data

考题 Which WAN technology was designed to give homes and small business high speed digital dial-up service over already existing communication infrastructure?() A. X25B. Frame RelayC. ATMD. ISDNE. ATXF. None of the above

考题 A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?() A. Data, Frame, Packet, Segment, BitB. Data, Frame, Segment, Packet, BitC. Data, Packet, Frame, Segment, BitD. Data, Packet, Segment, Frame, BitE. Data, Segment, Frame, Packet, BitF. Data, Segment, Packet, Frame, Bit

考题 Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()A、Broadband personal comm. Service (PCS)B、Broadband circuitC、InfraredD、Spread spectrumE、Cable

考题 What is a static packet-filtering firewall used for ?()A、It validates the fact that a packet is either a connection request or a data packet belonging to a connectionB、It evaluates network packets for valid data at the application layer before allowing connectionsC、It analyzes network traffic at the network and transport protocol layersD、It keeps track of the actual communication process through the use of a state table

考题 Which WAN technology was designed to give homes and small business high speed digital dial-up service over already existing communication infrastructure?()A、X25B、Frame RelayC、ATMD、ISDNE、ATXF、None of the above

考题 The corporate head office of TestKing has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence,what will happen?()A、UDP will send an ICMP Information Request to the source host.B、UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.C、UDP will drop the datagrams.D、UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.E、UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams.

考题 Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

考题 A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()A、Data, Frame, Packet, Segment, BitB、Data, Frame, Segment, Packet, BitC、Data, Packet, Frame, Segment, BitD、Data, Packet, Segment, Frame, BitE、Data, Segment, Frame, Packet, BitF、Data, Segment, Packet, Frame, Bit

考题 Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

考题 The IBM System Storage TS7650 ProtecTIER Appliance and Gateway solution is designed toaddress which customer requirement?()A、latency across a long distance network B、high-speed backup of large video files C、increase levels of data protection with enterprise class data integrity D、improve backup and recovery operations without changing existing backup processes,procedures or policies

考题 Which of the following choices correctly describes the difference between a data load via the conventional path and the direct path?()A、One runs faster than the otherB、A conventional path data load bypasses most of the Oracle RDBMS, whereas a direct path load is a high-speed version of the SQL INSERTC、A direct path data load bypasses most of the Oracle RDBMS, whereas a conventional path load is a high-speed version of the SQL INSERTD、The conventional path runs when the CONVENTIONAL command-line parameter is set to TRUE

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()A Broadband personal comm. Service (PCS)B Broadband circuitC InfraredD Spread spectrumE Cable

考题 单选题Which of the following choices correctly describes the difference between a data load via the conventional path and the direct path?()A One runs faster than the otherB A conventional path data load bypasses most of the Oracle RDBMS, whereas a direct path load is a high-speed version of the SQL INSERTC A direct path data load bypasses most of the Oracle RDBMS, whereas a conventional path load is a high-speed version of the SQL INSERTD The conventional path runs when the CONVENTIONAL command-line parameter is set to TRUE

考题 单选题What is a static packet-filtering firewall used for ?()A It validates the fact that a packet is either a connection request or a data packet belonging to a connectionB It evaluates network packets for valid data at the application layer before allowing connectionsC It analyzes network traffic at the network and transport protocol layersD It keeps track of the actual communication process through the use of a state table

考题 单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A NIMB HAGEO/HACMPC NFSD ftp, rsh and rexec

考题 多选题Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?()ABoth technologies guarantee an identical copy of data on the secondary nodeBOnly MySQL can maintain a time-delayed copy of data on the secondary nodeCBoth technologies use the TCP/IP stack as their primary transmission mediumDDRBD uses shared-disk technology

考题 单选题Which WAN technology was designed to give homes and small business high speed digital dial-up service over already existing communication infrastructure?()A X25B Frame RelayC ATMD ISDNE ATXF None of the above

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ