网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.
A.unique
B.separate
C.same
D.dependent
参考答案
更多 “ A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.A.uniqueB.separateC.sameD.dependent ” 相关考题
考题
根据下面的文字资料回答 71~75 题 In the following essay,each blank has four choices.Choose the most suitable one from the four choices and write down in the answer sheet.A( 1 )is basically an end point of a communication link between two applications.Sockets that extend over a network connect two or more applications running on separate computer sat tached to the network.Asocket( 2 )twoaddresses:( 3 ).Sockets providea ( 4 )communication channel between one or more systems.There are stream and datagram sockets separately using TCP and( 5 ).第6题:文中( 1 )处正确的答案是( )。A.programB.UDPC.socketD.TCP
考题
Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.A.dependentB.isolatedC.relatedD.standalone
考题
Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch
考题
is the 4th layer of the OSI reference model responsible for reliable network communication between end nodes.A.Data link layerB.Session layerC.Transport layerD.Application layer
考题
In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.A.handshakingB.interconnectingC.linkageD.joining
考题
Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()
A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization
考题
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider
考题
Which statement is correct about an OSPF sham-link?()A、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.B、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.C、A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.D、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.E、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
考题
In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast
考题
You are using standalone cisco aironet 1400 series wireless bridges for a nine-mile point-to-point wireless link between two buildings. Which distance setting should you use for the bridge configured as the root?()A、20 km [12.4 miles]B、10 km [6.2 miles]C、5 km [3.1 miles]D、25 km [15.5 miles]E、15 km [9.3 miles]
考题
Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A、a switch with a trunk link that is configured between the switchesB、a router with an IP address on the physical interface that is connected to the switchC、a switch with an access link that is configured between the switchesD、a router with subinterfaces configured on the physical interface that is connected to the switch
考题
You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()A、The link is using IEEE 802.1Q protocolB、The link is using IEEE 802.1E protocolC、Spanning tree is disabledD、Not enough information to determineE、The native VLAN information is identical at each end of the linkF、The native VLAN information is different at each end of the link
考题
You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-point wireless link between two buildings. Which distance setting should you use for the bridgeconfigured as the root?()A、20 km [12.4 miles]B、10 km [6.2 miles]C、5 km [3.1 miles]D、25 km [15.5 miles]E、15 km [9.3 miles]
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches
考题
A company has installed a new 802.11g point-to-point connection between two buildings and isexperiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link performance?()A、Replace the wireless bridges with wireless access points.B、Install bi-directional amplifiers at both sites.C、Configure channel hopping on both wireless bridges.D、Replace the omni-directional antennas with Yagi antennas
考题
During a planning session, it is determined that a three node cluster (Node ’A’, Node ’B’, and Node ’C’) will meet the customer’s application needs. Node ’B’ will be a hot-standby fallover node for both Node ’A’ and Node ’C’ resource groups. A serial network for this cluster will require which connections?() A、 A single serial network between Node ’A’ and Node ’B’ and Node ’C’B、 A point-to-point link between Node ’A’ and Node ’C’,and Node ’B’ and Node ’C’C、 A serial network between Node ’A’ and Node ’C’,and a serial network between Node ’B’ and Node ’C’D、 A point-to-point link between Node ’A’ and Node ’B’ Node ’B’ and Node ’C’ and Node ’A’ ad Node ’C’
考题
Routers A and B have an OC12c and a GE link between them and are running OSPF over both of these links.Which item is correct, assuming the default JUNOS software OSPF metric calculation?()A、There are two equal cost paths between A and BB、The GE link is the preferred path between A and BC、The OC12c link is the preferred path between A and BD、Manual metric assignment must be configured to determine the outcome.
考题
单选题Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A
a switch with a trunk link that is configured between the switchesB
a router with an IP address on the physical interface that is connected to the switchC
a switch with an access link that is configured between the switchesD
a router with subinterfaces configured on the physical interface that is connected to the switch
考题
单选题Companycom has a p5 595 running 12 LPARs. They are interested in high bandwidth, secure communication between two of the LPARs within the p5 595 server. They do not have any unused Ethernet adapters. Which of the following recommendations will best meet this requirement?()A
Utilize the integrated 10/100/1000 network interfaceB
Implement Virtual Ethernet to enable inter-partition communicationC
Implement shared Ethernet with the Ethernet adapters utilized in the other LPARsD
Implement a Point to Point protocol serial communication between the p5 595 serial ports
考题
单选题Barely able to speak because of the cold, the communication among the two explorers had to be done through gestures.A
the communication among the two explorers had to be done through gesturesB
the communication between the two explorers had to be done through gesturesC
the two explorers had to communicate through gesturesD
the two explorers had to communicate between themselves from gesturesE
gestures were used to communicate between the two explorers
考题
多选题Which two wireless devices acts as a communication connection between the client and WLAN()AbridgeBaccess pointCwireless adaptorDLayer 3 switchEantenna
考题
单选题What is the primary use of a remote access VPN?()A
to secure communication between two remote PCsB
to secure communication between two remote officesC
to secure communication betweenan remote PC and the corporate intranetD
to secure communication between a corporate intranet and the public internet
考题
单选题Which statement is correct about an OSPF sham-link?()A
A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.B
A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.C
A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.D
A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.E
A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
考题
单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A
a router with subinterfaces configured on the physical interface that is connected to the switchB
a router with an IP address on the physical interface connected to the switchC
a switch with an access link that is configured between the switchesD
a switch with a trunk link that is configured between the switches
考题
多选题You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()AThe link is using IEEE 802.1Q protocolBThe link is using IEEE 802.1E protocolCSpanning tree is disabledDNot enough information to determineEThe native VLAN information is identical at each end of the linkFThe native VLAN information is different at each end of the link
考题
单选题The lowest point between two waves is called().A
thoughB
toughC
throughD
trough
热门标签
最新试卷