网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which three statements describe the User Datagram Protocol (UDP)?()
A
UDP provides delivery notification and error checking mechanisms.
B
UDP is faster than the Transmission Control Protocol (TCP).
C
UDP application examples include DNS and VoIP.
D
UDP is an application layer protocol.
E
UDP uses a best effort delivery approach.
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.” 相关考题
考题
Which three statements describe the User Datagram Protocol (UDP)?()
A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.
考题
An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?()
A.AB.BC.CD.DE.E
考题
Which two characteristitcs describe the UDP protocol?()
A. limited error checkingB. defined timersC. no recovery mechanismsD. three-way handshake
考题
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)
A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products
考题
Which three statements are true about the Internet Group Management Protocol (IGMP)? ()
A. There are three IGMP modes: dense mode, sparse mode, and sparse - dense modeB. IGMP is used to register individual hosts with a multicast groupC. IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic fromD. IGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1E. IGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRPF. IGMP snooping ru ns on Layer 3 routers
考题
Which statements describe the routing protocol OSPF?()
A. It supports VLSM.B. It is used to route between autonomous systems.C. It confines network instability to one area of the network.D. It increases routing overhead on the network.E. It allows extensive control of routing updates.F. It is simpler to configure than RIP v2.
考题
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the( )layer of the Internet protocol suite. All SNMP messages are transported via User( )Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) (请作答此空)(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).A.Agent
B.Client
C.Proxy
D.User
考题
Which three statements about the features of SNMPv2 and SNMPv3 are true?()A、SNMPv3 enhanced SNMPv2 security featuresB、SNMPv3 added the Inform protocol message to SNMPC、SNMPv2 added the Inform protocol message to SNMPD、SNMPv3 added the GetBulk protocol messages to SNMPE、SNMPv2 added the GetBulk protocol message to SNMPF、SNMPv2 added the GetNext protocol message to SNMP
考题
For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()A、It is restricted in size to only three segmentsB、It requires the use of netBT as the network protocolC、It requires the implementation of IKED、It relies on an underlying Public Key Infrastructure
考题
Which two characteristics describe the UDP protocol?()A、limited error checkingB、defined timersC、no recovery mechanismsD、three-way handshake
考题
Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.
考题
Which statements describe the routing protocol OSPF?()A、It supports VLSM.B、It is used to route between autonomous systems.C、It confines network instability to one area of the network.D、It increases routing overhead on the network.E、It allows extensive control of routing updates.F、It is simpler to configure than RIP v2.
考题
Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.
考题
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products
考题
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX
考题
Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values
考题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
多选题Which three statements describe the differences between RIP version 1 and RIP version 2? (Choose three.)()ARIP version 1 broadcasts updates whereas RIP version 2 uses multicasts.BRIP version 1 multicasts updates while RIP version 2 uses broadcasts.CBoth RIP version 1 and RIP version 2 are classless routing protocols.DRIP Version 2 is a classless routing protocol whereas RIP version 1 is a classful routing protocol.EBoth RIP version 1 and version 2 support authentication.FRIP version 2 sends the subnet mask in updates and RIP version 1 does not.
考题
多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values
考题
多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.
考题
多选题Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()AWithin an AS, all routers must run either BGP or IBGP.BAn AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.CAn AS is a group of routers under the same technical administration.DWithin an AS, routes learned through BGP can be redistributed using interior gateway protocols.EWi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.
考题
多选题Which two characteristics describe the UDP protocol?()Alimited error checkingBdefined timersCno recovery mechanismsDthree-way handshake
考题
多选题Which three statements are true about the Internet Group Management Protocol (IGMP)? ()AThere are three IGMP modes: dense mode, sparse mode, and sparse - dense modeBIGMP is used to register individual hosts with a multicast groupCIGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic fromDIGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1EIGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRPFIGMP snooping ru ns on Layer 3 routers
考题
多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products
考题
单选题For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()A
It is restricted in size to only three segmentsB
It requires the use of netBT as the network protocolC
It requires the implementation of IKED
It relies on an underlying Public Key Infrastructure
考题
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
多选题Which three statements about the features of SNMPv2 and SNMPv3 are true?()ASNMPv3 enhanced SNMPv2 security featuresBSNMPv3 added the Inform protocol message to SNMPCSNMPv2 added the Inform protocol message to SNMPDSNMPv3 added the GetBulk protocol messages to SNMPESNMPv2 added the GetBulk protocol message to SNMPFSNMPv2 added the GetNext protocol message to SNMP
热门标签
最新试卷