网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
A
NTP
B
FTP
C
RTP
D
IGMP
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A NTPB FTPC RTPD IGMP” 相关考题
考题
Which of the following protocols is commonly used for VoIP technology?()
A.TelnetB.SMTPC.SIPD.SNMP
考题
Which of the following protocols is used to encrypt data between web servers and web browsers?()
A.SMTPB.SIPC.HTTPD.SSL
考题
Which of the following protocols should be used to monitor network performance?()
A.SNTPB.SMTPC.HTTPD.SNMP
考题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
A.NTPB.FTPC.RTPD.IGMP
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()
A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts
考题
Which of the following routing protocols are less likely prone routing loops and network reachability problems when used in discontiguous networks?()
A. IGRPB. CDPC. OSPFD. RIP v1E. RIP v2F. EIGRP
考题
Which of the following routing protocols are less likely prone routing loops and network reachability problems when used in discontiguous networks?()A、IGRPB、CDPC、OSPFD、RIP v1E、RIP v2F、EIGRP
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
考题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP
考题
Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP
考题
Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA
考题
A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A、IPv6B、RIPC、IGRPD、RIPv2
考题
Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()A、DNSB、FTPC、WINSD、IMAP4
考题
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
考题
Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP
考题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
考题
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat
考题
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP
考题
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
考题
单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()A
LDAPB
IMAPC
TFTPD
SNMP
考题
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A
WEPB
PEAPC
WPAD
TKIP
考题
单选题Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network?()A
RIPB
STPC
IGRPD
CDPE
VTP
考题
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A
lsattrB
pstatC
netstatD
ifconfig
考题
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A
PAPB
CHAPC
EAP-TLSD
Kerberos
考题
多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts
考题
单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A
SMTPB
SIPC
HTTPD
SSL
考题
单选题A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A
IPv6B
RIPC
IGRPD
RIPv2
热门标签
最新试卷