网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following could be used to provide a Layer 3 data path between separate VLANs?()
A

VLAN trunking

B

An external router

C

An internal route processor

D

VLAN capable bridge

E

EtherChannel


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following could be used to provide a Layer 3 data path between separate VLANs?()AVLAN trunkingBAn external routerCAn internal route processorDVLAN capable bridgeEEtherChannel” 相关考题
考题 Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN

考题 Which one of the following is the most commonly used layer 2 network device?() A. HubB. BridgeC. SwitchD. RouterE. RepeatersF. None of the above

考题 Which of the following are key characteristics of PPP?() A. can be used over analog circuitsB. maps Layer 2 to Layer 3 addressC. encapsulates several routed protocolsD. supports IP onlyE. provides error correction

考题 Which of the following are key characteristics of PPP (Choose three.)()。 A.can be used over analog circuitsB.maps Layer 2 to Layer 3 addressC.encapsulates several routed protocolsD.supports IP onlyE.provides error correction

考题 Which of the following are key characteristics of PPP (Choose three.)()。A、can be used over analog circuitsB、maps Layer 2 to Layer 3 addressC、encapsulates several routed protocolsD、supports IP onlyE、provides error correction

考题 Which of the following statements are true for routers but not true for Layer 3 Ethernet switches?(Choose all that apply.)()A、May have Ethernet as well as non-Ethernet interfacesB、Traditionally used as a standalone device for inter-VLAN communicationC、Makes use of TCAMsD、Uses subinterfaces to define trunksE、Can use both Layer 2 and Layer 3 to make forwarding decisionsF、Allows the definition of Switched Virtual Interfaces(SVI)

考题 Which of the following could be used to provide a Layer 3 data path between separate VLANs?()A、 VLAN trunkingB、 An external routerC、 An internal route processorD、 VLAN capable bridgeE、 EtherChannel

考题 Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()A、Layer 1 statusB、Output queue dropsC、Interface CPU utilizationD、Cable type connected to interfaceE、Layer 2 statusF、Input queue drops

考题 which one of the following best where layer can be used?()A、form B、page C、subform D、all of the above

考题 At which of the following layers does the ICMP protocol operate?()A、Layer 1B、Layer 3C、Layer 4D、Layer 5

考题 At which of the following OSI model layers is HTTPS encryption performed?()A、Layer 3B、Layer 5C、Layer 6D、Layer 7

考题 The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network

考题 Which of the following are key characteristics of PPP?()A、can be used over analog circuitsB、maps Layer 2 to Layer 3 addressC、encapsulates several routed protocolsD、supports IP onlyE、provides error correction

考题 Which one of the following is the most commonly used layer 2 network device?()A、HubB、BridgeC、SwitchD、RouterE、RepeatersF、None of the above

考题 Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A、RAID array managementB、CHKDSKC、Monitoring agentsD、Partitioning management

考题 Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG

考题 Which of the following disk protection methods would be used to provide the maximum amount of data  availability()A、RAID 0B、RAID 1C、RAID 3D、RAID 5

考题 Which of the following is used in an IBM Blade Center to provide cooling?()A、Fans for each bladeB、Chilled WaterC、BlowersD、Freon

考题 多选题Which of the following statements are true for routers but not true for Layer 3 Ethernet switches?(Choose all that apply.)()AMay have Ethernet as well as non-Ethernet interfacesBTraditionally used as a standalone device for inter-VLAN communicationCMakes use of TCAMsDUses subinterfaces to define trunksECan use both Layer 2 and Layer 3 to make forwarding decisionsFAllows the definition of Switched Virtual Interfaces(SVI)

考题 单选题Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A  RAID array managementB  CHKDSKC  Monitoring agentsD  Partitioning management

考题 单选题Which one of the following is the most commonly used layer 2 network device?()A HubB BridgeC SwitchD RouterE RepeatersF None of the above

考题 多选题Which of the following are key characteristics of PPP? (Choose three.)()Acan be used over analog circuitsBmaps Layer 2 to Layer 3 addressCencapsulates several routed protocolsDsupports IP onlyEprovides error correction

考题 单选题Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A Use default Layer 4 hash in core.B Use default Layer 3 hash in distribution.C Use default Layer 4 hash in distribution.D Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

考题 单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()A rogue detectorB rogue containmentC RLDPD RIDP

考题 多选题Which of the following are key characteristics of PPP?()Acan be used over analog circuitsBmaps Layer 2 to Layer 3 addressCencapsulates several routed protocolsDsupports IP onlyEprovides error correction

考题 单选题Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A  Use default Layer 4 hash in core.B  Use default Layer 3 hash in distribution.C  Use default Layer 4 hash in distribution.D  Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

考题 单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A VLANB Peer to PeerC VTPD VPN