网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A
Ring
B
Mesh
C
Star
D
Hybrid
参考答案
参考解析
解析:
暂无解析
更多 “单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A RingB MeshC StarD Hybrid” 相关考题
考题
CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages
考题
● An internet is a combination of networks connected by (71) . When a datagram goes from a source to a (72) , it will probably pass many (73) until it reaches the router attached to the destination network. A router receives a (74) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?(71)A. modemsB. routersC. switchesD. computers(72)A. userB. hostC. cityD. destination(73)A. destinationsB. routersC. packetsD. computers(74)A. destinationB. resourceC. packetD. source(75)A. pathwaysB. routersC. diagramsD. calls
考题
An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers
考题
When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up
考题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A.RingB.MeshC.StarD.Hybrid
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
A. StarB. HybridC. MeshD. Ring
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A、Install anti-virus software on the student computers.B、Put the faculty computers in a separate VLAN.C、Power down the switches that connect to faculty computers when they are not in use.D、Remove the student computers from the network and put them on a peer-to-peer network.E、Create an access list that blocks the students from the Internet where the hacking tolls are located.
考题
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(1)处应选择()A、modemsB、routersC、switcherD、computers
考题
Where is the TX reference point? ()A、Where the jumper cable is connected to the output of the TX.B、Where the jumper cable is connected to the RBS.C、Where the jumper cable is connected to the output of the combiner.D、Where the jumper cable is connected to the antenna.E、Immediately outside the antenna.
考题
How does a switch respond when it receives a message?()A、It reads the Layer-5 information and sends the message directly to the intended computer.B、It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.C、It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.D、It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
考题
What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
考题
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
考题
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
考题
Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()A、Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.B、Configure three different hardware profiles on each portable computer.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.
考题
多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch
考题
多选题You are the network administrator for Company. Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers. What should you do?()AConfigure three different hardware profiles on each portable computer.BConfigure a single hardware profile and rename it to Universal Profile.CConfigure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.DInstruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled docking station.EConfigure the hardware profiles selection to wait until a hardware profile is selected.FConfigure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.GConfigure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.
考题
单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A
Install anti-virus software on the student computers.B
Put the faculty computers in a separate VLAN.C
Power down the switches that connect to faculty computers when they are not in use.D
Remove the student computers from the network and put them on a peer-to-peer network.E
Create an access list that blocks the students from the Internet where the hacking tolls are located.
考题
单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A
Create an Ipsec enforcement network policy.B
Create an 802.1xenforcemen tnetwork policy.C
Createa wired network(IEEE802.3)Group policy.D
Create an extensible authentication protocol(EAP)enforcement network policy.
考题
单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information. What should you do?()A
Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B
Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C
Use Windows Explorer to enable automatic caching for documents on the network share.D
Create a new share for the Sales users only and enable caching on that share only.
考题
多选题What are two reasons a network administrator would use CDP (Choose two.)()。Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers
考题
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A
Create an IPsec Enforcement Network policyB
Create an 802.1X enforcement network policyC
Create a wired network (IEEE 802.3) Group PolicyD
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
考题
单选题DC generators are classified according to the manner in which()A
they are usedB
the field windings are connected to the loadC
the armature circuit is connected to the loadD
the field windings are connected to the armature circuit
考题
单选题All of the client computers in your company network are Windows 2000 portable computers. A user named Maria stores Sales files in her My Documents folder. She uses these files when she travels. Maria informs you that when she takes her portable computer to trade shows, she can access some of the Sales files but not all of them. When her portable computer is connected to the network at the office, she can access all of the files. You need to enable Maria to access all of the files in her My Documents folder when she is working remotely. What should you do?()A
Allow Maria full control permissions on the %systemroot%/documents and settings/Maria/MyDocuments folderB
Allow Maria full control permissions on the %systemroot%/documents and settings/all users/My Documents folderC
Configure Maria’s computer to automatically copy the entire contents of her network My Documents folder to her offline files folder.D
Configure Maria’s computer to automatically copy the entire contents of her network My Documents folder to her local My Documents folder.
考题
单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A
Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B
Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C
Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D
Configure the IP properties of the portable computers so that they have an alternate configuration.
热门标签
最新试卷